Fig. 11From: Authentication strategies in vehicular communications: a taxonomy and frameworkCryptographic method class in expanded formBack to article page