메뉴 건너뛰기




Volumn 3439, Issue , 2005, Pages 230-242

An open approach for designing secure electronic immobilizers

Author keywords

Distance Bounding; Electronic Immobilizer; Mafia Attack; Motor Control Unit; RFID; Transponder; Trusted Computing

Indexed keywords

COSTS; ELECTRONIC EQUIPMENT; FEES AND CHARGES; INSURANCE;

EID: 24644519038     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31979-5_20     Document Type: Conference Paper
Times cited : (12)

References (16)
  • 1
    • 24644465803 scopus 로고    scopus 로고
    • http://www.secureyourmotor.gov.uk.
  • 2
    • 24644487534 scopus 로고    scopus 로고
    • http://www.verkehrsunfallforensik.de/pdf/68_Wegfahrsperren.pdf.
  • 4
    • 24644510936 scopus 로고    scopus 로고
    • Die neue Strategie der Autodiebe
    • Die neue Strategie der Autodiebe. Frankfurter Allgemeine Zeitung, Nr. 40, Seite T1, 2004.
    • (2004) Frankfurter Allgemeine Zeitung , vol.40
  • 5
    • 85030309636 scopus 로고
    • Identification tokens - Or: Solving the chess grandmaster problem
    • A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • Thomas Beth and Yvo Desmedt. Identification Tokens - Or: Solving the Chess Grandmaster Problem. In A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 169-176. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1991.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 169-176
    • Beth, T.1    Desmedt, Y.2
  • 6
    • 84958641478 scopus 로고    scopus 로고
    • Differential fault analysis of secret key cryptosystems
    • Burton S. Kaliski Jr., editor, Advances in Cryptology - CRYPTO '97, Springer-Verlag
    • Eli Biham and Adi Shamir. Differential Fault Analysis of Secret Key Cryptosystems. In Burton S. Kaliski Jr., editor, Advances in Cryptology - CRYPTO '97, volume 1294 of LNCS, pages 513-525. Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 8
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • Stefan Brands and David Chaum. Distance-Bounding Protocols. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 344-359. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1994.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 9
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, Springer-Verlag
    • Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong Authentication for RFID Systems Using the AES Algorithm. In M. Joye and J.-J. Quisquater, editors, Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of LNCS, pages 357-370. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 11
    • 24644448926 scopus 로고    scopus 로고
    • Nov Version 1.2.
    • Trusted Computing Group. TPM main specification. http://www. trustedcomputinggroup.org, Nov 2003. Version 1.2.
    • (2003) TPM Main Specification
  • 12
    • 24644496958 scopus 로고    scopus 로고
    • Theft protection by means of embedded encryption in RFID transponders
    • Cologne, Germany, November
    • Ulrich Kaiser. Theft Protection by means of Embedded Encryption in RFID Transponders (Immobilizer). ESCAR conference, Cologne, Germany, November 2003.
    • (2003) ESCAR Conference
    • Kaiser, U.1
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • M. Wiener, editor, Advances in Cryptology - CRYPTO '99, Springer-Verlag
    • Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology - CRYPTO '99, volume 1666 of LNCS, pages 388-397. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 15
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Security Protocols-7th International Workshop, Cambridge, United Kingdom, Springer-Verlag, Berlin Germany
    • Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols-7th International Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172-194, Cambridge, United Kingdom, 2000. Springer-Verlag, Berlin Germany.
    • (2000) Lecture Notes in Computer Science , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 16
    • 5444232966 scopus 로고    scopus 로고
    • Electronical driving authority - How safe is safe?
    • W. Thönnes and S. Kruse. Electronical driving authority - how safe is safe? -. VDI Berichte Nr. 1789, 2003.
    • (2003) VDI Berichte Nr. 1789 , vol.1789
    • Thönnes, W.1    Kruse, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.