Fig. 9From: Authentication strategies in vehicular communications: a taxonomy and frameworkThe structures used in our taxonomyBack to article page