Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks
Table 3
Communication comparison of the proposed dereplication approach and the state-of-the-art techniques, i.e., Yu et al.’s algorithm [16], Cui et al.’s algorithm [17], and Xiong et al.’s algorithm [36].