Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
Figure 3
Performance comparison between the proposed approach and the state-of-the-art Yu et al.’s algorithm [16], Cui et al.’s algorithm [17], and Xiong et al.’s algorithm [36]. (a) Communication overhead comparison. (b) Storage overhead comparison.