Fig. 2From: A survey of local/cooperative-based malicious information detection techniques in VANETsSimple VPKI structureBack to article page