• Aucun résultat trouvé

Authentication and consensus overhead in vehicular ad hoc networks

N/A
N/A
Protected

Academic year: 2021

Partager "Authentication and consensus overhead in vehicular ad hoc networks"

Copied!
15
0
0

Texte intégral

Loading

Figure

Table 1 Operation times
Table 3 Signature generation and verification times on a Pentium D 3.4 GHz workstation
Fig. 2 WAVE safety message format [30]
Fig. 4 Highway scenario
+7

Références

Documents relatifs

Differential Harnack estimates for backward heat equations with potentials under an extended Ricci flow, Adv.. The (logarithmic) Sobolev inequalities alonf geometric flow

We first prove that, surprisingly, even when all nodes transmit at the same power, finding a simple unicast path that guarantees enough remaining energy locally at each node in

For higher values, using the localization algorithm leads to an increase in the end-to-end delay and to significant packet loss due to an excessive delay (5 % of packets with a

Galbraith, Lin, and Scott [9] and the author [26] have already con- structed families of endomorphisms equipped with a convenient ready-made basis; in this work, we generalize

In Section 5 we analyze the complexity of the blockwise product for two polynomials supported by monomials of degree at most d − 1: if A contains Q in its center, then we show

Matériaux constitutifs des écrans cathodiques Les écrans à tube cathodique sont composés de matériaux divers et variés, principalement du métal et des polymères synthétiques pour

Le premier parle sur la théorie de décision et le choix de la loi a priori et a posteriori motivé par des applications de calcul de la puissance bayésienne et la taille

trade secrets and intellectual property rights are but a partial defence against disclosure and may be relied on only to the extent strictly necessary to protect