Public-Key replacement attacks on lightweight authentication schemes for resource-constrained scenarios
Ensuring data integrity and data source trustworthiness during data sharing has always attracted the attention of researchers. Very recently, Zhu et al. designed a lightweight conditional privacy-preserving identity authentication scheme for securing vehicular ad-hoc networks. Feng et al. constructe...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
KeAi Communications Co., Ltd.
2025-12-01
|
| Series: | Cyber Security and Applications |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2772918425000190 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|