Research Article
Efficient Noninteractive Secure Protocol Enforcing Privacy in Vehicle-to-Roadside Communication Networks
Table 3
Number of invocations of similar methods.
| Operation | Invocations of protocol [1] | Invocations of protocol [2] |
| RSA encryption | 2 | 2 | RSA decryption | 2 | 2 | DSA signature | 1 | 1 | DSA signature verification | 1 | 1 | Modular exponentiation | 2 | 4 |
|
|