Research Article
Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs
Figure 3
Computation delay. (a) Computation delay in one message signing and verification. (b) Signing delay vs number of messages. (c) Verification delay vs number of messages.
(a) |
(b) |
(c) |