Research Article

An Efficient V2I Authentication Scheme for VANETs

Figure 4

Computational costs of verification phase in different schemes.