28
Views
8
CrossRef citations to date
0
Altmetric
Articles

Pseudonym generation using genetic algorithm in vehicular ad hoc networks

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Parveen, Rishipal Singh & Sushil Kumar. (2021) IoV based intelligent vehicle tracker using FoG computing with supervised machine learning techniques. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1393-1413.
Read now
Babu Ram & Neelendra Badal. (2019) Latency estimation based routing (LEBR) protocol in vehicular adhoc networks (VANETs). Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1517-1531.
Read now
Sunil Kumar & Karan Singh. (2019) A keyless secure data aggregation mechanism. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1533-1548.
Read now

Articles from other publishers (5)

Junchao Wang, Yan Sun & Chris Phillips. (2023) Fake Beacon: A Pseudonym Changing Scheme for Low Vehicle Density in VANETs. Fake Beacon: A Pseudonym Changing Scheme for Low Vehicle Density in VANETs.
Basmh Alkanjr & Imad Mahgoub. (2023) Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques. Sensors 23:6, pages 3142.
Crossref
Ahsan Hayat, Zainab Iftikhar, Majid Iqbal Khan, Abolfazl Mehbodniya, Julian L. Webber & Sarmad Hanif. (2023) A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas. IEEE Access 11, pages 89974-89985.
Crossref
Ashutosh Srivastava, Sachin Kumar Gupta, Mohd Najim, Nitesh Sahu, Geetika Aggarwal & Bireshwar Dass Mazumdar. (2021) DSSAM: digitally signed secure acknowledgement method for mobile ad hoc network. EURASIP Journal on Wireless Communications and Networking 2021:1.
Crossref
Umberto Cerruti, Simone Dutto & Nadir Murru. (2020) A symbiosis between cellular automata and genetic algorithms. Chaos, Solitons & Fractals 134, pages 109719.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.