Research Article

A Batch Authentication Design to Protect Conditional Privacy in Internet of Vehicles

Figure 5

Comparison of PKM and SMV computation costs.