Fig. 3From: Authentication strategies in vehicular communications: a taxonomy and frameworkClassification based on Riley et al. [62]Back to article page