Return to Article Details Authentication techniques in VANETs-A Survey Download Download PDF