Fig. 4From: Authentication strategies in vehicular communications: a taxonomy and frameworkClassification based on Qu et al. [63]Back to article page