Research Article

An Efficient V2I Authentication Scheme for VANETs

Figure 3

Computational costs of signature phase in different schemes.