메뉴 건너뛰기




Volumn , Issue 2016, 2007, Pages 227-237

Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMOTIVE APPLICATIONS; AUTOMOTIVE SYSTEMS; SYSTEMATIC MANIPULATION; TACHOGRAPHS;

EID: 37149034453     PISSN: 00835560     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Review
Times cited : (5)

References (9)
  • 1
    • 84858511293 scopus 로고    scopus 로고
    • Electronic Safety and Security - New Challenges for the Car Industry
    • Köln
    • Ross Anderson: Electronic Safety and Security - New Challenges for the Car Industry. In Workshop on Embedded Security in Cars, Köln, 2003.
    • (2003) Workshop on Embedded Security in Cars
    • Ross Anderson1
  • 2
    • 84858503549 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group, www.trustedcomputinqgroup.org.
  • 3
    • 84858498186 scopus 로고    scopus 로고
    • Embedded Security (TPM)
    • Atmel Corporation
    • Atmel Corporation: Embedded Security (TPM). www.atmel.com/products/ Embedded/
  • 5
    • 37148998739 scopus 로고    scopus 로고
    • Alexandre Saad and Ulrich Weinmann: Automotive Software Engineering and Concepts. In Gl Jahrestagung, 318-319, 2003.
    • Alexandre Saad and Ulrich Weinmann: Automotive Software Engineering and Concepts. In Gl Jahrestagung, 318-319, 2003.
  • 6
    • 84858503552 scopus 로고    scopus 로고
    • Gleschen Consultancy, Report: IP Theft up 22%, massive $3 Trillion Counter-feits, In www.bascap.com. Mai 2005.
    • Gleschen Consultancy, Report: IP Theft up 22%, massive $3 Trillion Counter-feits, In www.bascap.com. Mai 2005.
  • 7
    • 84858495354 scopus 로고    scopus 로고
    • Oktober
    • Sativa Ross: Parts Counterfeiting. In www.aftermarketbusiness.com/ aftermarketbusiness/article/articleDetail.isp?id=125346, Oktober, 2004
    • (2004) Parts Counterfeiting
    • Sativa Ross1
  • 8
    • 37149016023 scopus 로고    scopus 로고
    • Common Criteria. Common Methodology for Information Technology Security Evaluation. Evaluation Methodology. Version 2.2, Revision 256 CCIMB-2004-01-004, January 2004
    • Common Criteria. Common Methodology for Information Technology Security Evaluation. Evaluation Methodology. Version 2.2, Revision 256 CCIMB-2004-01-004, January 2004
  • 9
    • 37149001478 scopus 로고    scopus 로고
    • Common Criteria. Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards, Version 2.1, Revision 1. CCDB-2006-04-002, 2006
    • Common Criteria. Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards, Version 2.1, Revision 1. CCDB-2006-04-002, 2006


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.