Research Article

Secure and Efficient Communication in VANETs Using Level-Based Access Control

Figure 2

Signcryption ciphertext generation processing time. (a) Type A curve on Intel. (b) Type A curve on ARM. (c) Type A1 curve on Intel. (d) Type A1 curve on ARM.
(a)
(b)
(c)
(d)