《Table 1 Time consumption operations》

《Table 1 Time consumption operations》   提示:宽带有限、当前游客访问压缩模式
本系列图表出处文件名:随高清版一同展现
《Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks》


  1. 获取 高清版本忘记账户?点击这里登录
  1. 下载图表忘记账户?点击这里登录

Accordingly,the estimated time is exhibited in Table 1,where TSMis scalar multiplication,TPAis point addition,TBPis bilinear pairing,and TMPHis map-topoint special hash function.Vi’s side signature generation would use almost 0.39 ms and RSU’s would use0.78 ms for verification.If any simultaneous multiplication method would be employed as explained before,RSU’s also uses 0.39 ms of course.