Fig. 13From: Authentication strategies in vehicular communications: a taxonomy and frameworkPrivacy principle class in expanded formBack to article page