A lightweight V2R authentication scheme based on trusted group deployment

JIANG Chenyu, CHEN Fulong, WANG Taochun, XIE Dong, HU Peng

Journal of Cybersecurity ›› 2025, Vol. 3 ›› Issue (2) : 110-123.

PDF(947 KB)
PDF(947 KB)
Journal of Cybersecurity ›› 2025, Vol. 3 ›› Issue (2) : 110-123. DOI: 10.20172/j.issn.2097-3136.250210
Technology Application

A lightweight V2R authentication scheme based on trusted group deployment

    {{javascript:window.custom_author_en_index=0;}}
  • {{article.zuoZhe_EN}}
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

QR code of this article

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}[J]. {{journal.qiKanMingCheng_EN}}, 2025, 3(2): 110-123 https://doi.org/10.20172/j.issn.2097-3136.250210

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(947 KB)

Accesses

Citation

Detail

Sections
Recommended

/