Research Article
An Efficient V2I Authentication Scheme for VANETs
| Symbols | Definition |
| | The running time of an exponentiation operation | | The running time of a bilinear pairing operation | | The running time of multiplication operation with two bilinear pairings | | The running time of a point addition operation correlated with the ECC | | The running time of a scale multiplication operation correlated with the ECC | | The running time of a common hash function operation |
|
|