Research Article

Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks

Figure 3

Performance comparison between the proposed approach and the state-of-the-art Yu et al.’s algorithm [16], Cui et al.’s algorithm [17], and Xiong et al.’s algorithm [36]. (a) Communication overhead comparison. (b) Storage overhead comparison.
(a)
(b)