Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks are often required to cope with schemes based on either bilinear pair cryptography (BPC) or elliptic curve cryptography (ECC). Nevertheless, these schemes suffer from massively inefficient performance relate...
Main Authors: | Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-06-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/12/12/5939 |
Similar Items
-
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks
by: Mahmood A. Al-Shareeda, et al.
Published: (2022-07-01) -
ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing
by: Badiea Abdulkarem Mohammed, et al.
Published: (2023-03-01) -
Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks
by: Zeyad Ghaleb Al-Mekhlafi, et al.
Published: (2023-01-01) -
Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
by: Zeyad Ghaleb Al-Mekhlafi, et al.
Published: (2024-01-01) -
FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks
by: Badiea Abdulkarem Mohammed, et al.
Published: (2023-01-01)