Research Article

Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs

Figure 3

Computation delay. (a) Computation delay in one message signing and verification. (b) Signing delay vs number of messages. (c) Verification delay vs number of messages.
(a)
(b)
(c)