Return to Article Details Security Scheme and Its Application towards Vehicular Computing Download Download PDF