Research Article

A Privacy-Preserving Authentication Scheme for VANETs with Exculpability

Figure 2

Approximate time required for signature, verification, and update processes.