Research Article

Efficient Noninteractive Secure Protocol Enforcing Privacy in Vehicle-to-Roadside Communication Networks

Table 3

Number of invocations of similar methods.

OperationInvocations of protocol [1]Invocations of protocol [2]

RSA encryption22
RSA decryption22
DSA signature11
DSA signature verification11
Modular exponentiation24