Fig. 8From: Authentication strategies in vehicular communications: a taxonomy and frameworkClassification based on this paperBack to article page