Mu Han, Lei Hua, Wenshan Liu, Shidian Ma Jiangsu University, ChinaJuly 17th, 2016
FiledJuly 17th, 2016parameters QV = H1 (TIDV ) , sV =ψ TAQV and downloads them into it. In order to ensure vehicles could not traced by the malicious nodes, when vehicles enter a new range