Research Article
An Efficient V2I Authentication Scheme for VANETs
Table 3
Computational costs comparison of the signature and verification phases in theory (ms).
| | Signing | Verification |
| Wang and Yao [9] | | | Weng et al. [22] | | | Zhou et al. [23] | | | Wan et al. [24] | | | Zhao et al. [25] | | | Weng et al. [26] | | | Chen et al. [27] | | | Our scheme | | |
|
|