-
1
-
-
50249119911
-
Firmware Update over the Air (FOTA) for Automotive Industry
-
Hollywood, CA, USA
-
M. Shavit, A. Gryc, and R. Miucic, "Firmware Update over the Air (FOTA) for Automotive Industry," in Asia Pacific Automotive Engineering Conference, Hollywood, CA, USA, 2007.
-
(2007)
Asia Pacific Automotive Engineering Conference
-
-
Shavit, M.1
Gryc, A.2
Miucic, R.3
-
4
-
-
58149134776
-
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
-
D. K. Nilsson, U. E. Larson, F. Picasso, and E. Jonsson, "A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay," in Proceedings of the First International Workshop on Computational Intelligence in Security for Information Systems (CISIS), 2008.
-
(2008)
Proceedings of the First International Workshop on Computational Intelligence in Security for Information Systems (CISIS)
-
-
Nilsson, D.K.1
Larson, U.E.2
Picasso, F.3
Jonsson, E.4
-
5
-
-
56449121505
-
Security in Automotive Bus Systems
-
Bochum, Germany, November
-
M. Wolf, A. Weimerskirch, and C. Paar, "Security in Automotive Bus Systems," in Workshop on Embedded IT-Security in Cars, Bochum, Germany, November 2004.
-
(2004)
Workshop on Embedded IT-Security in Cars
-
-
Wolf, M.1
Weimerskirch, A.2
Paar, C.3
-
6
-
-
56449111413
-
Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
-
Salzburg, Austria
-
T. Hoppe and J. Dittman, "Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy," in Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), Salzburg, Austria, 2007.
-
(2007)
Proceedings of the 2nd Workshop on Embedded Systems Security (WESS)
-
-
Hoppe, T.1
Dittman, J.2
-
7
-
-
58149109223
-
Future Perspectives: The car and its IP-address - A potential safety and security risk assessment
-
Nuremberg, Germany
-
A. Lang, J. Dittman, S. Kiltz, and T. Hoppe, "Future Perspectives: The car and its IP-address - A potential safety and security risk assessment," in The 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Nuremberg, Germany, 2007.
-
(2007)
The 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP)
-
-
Lang, A.1
Dittman, J.2
Kiltz, S.3
Hoppe, T.4
-
10
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," in Mobile Computing and Networking, 2001, pp. 189-199.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
11
-
-
58149121395
-
Overview of Bosch Motronic Hardware
-
ecu overview.htm, visited November
-
"Overview of Bosch Motronic Hardware," http://volvospeed.com/ obd2/ ecu overview.htm, visited November, 2007.
-
(2007)
-
-
-
12
-
-
58149121396
-
CP3SP33 Connectivity Processor with Cache, DSP, and Bluetooth, USB, and Dual CAN Interfaces
-
National Semiconductor
-
National Semiconductor, "CP3SP33 Connectivity Processor with Cache, DSP, and Bluetooth, USB, and Dual CAN Interfaces," Datasheet, 2005.
-
(2005)
Datasheet
-
-
-
13
-
-
58149112736
-
-
Bosch, CAN Specification 2.0, http://www.dcd.pl/dcdpdf/ can2spec. pdf, 1991, visited August, 2007.
-
Bosch, "CAN Specification 2.0," http://www.dcd.pl/dcdpdf/ can2spec. pdf, 1991, visited August, 2007.
-
-
-
-
15
-
-
33745269795
-
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks
-
February
-
Y. W. Law, J. Doumen, and P. Hartel, "Survey and Benchmark of Block Ciphers for Wireless Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65-93, February 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, Issue.1
, pp. 65-93
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
16
-
-
58149139323
-
Performance Analysis of 3G Protocol: Encryption and Authentication
-
Ilkley, West Yorkshire, U.K
-
A. Singhrova and R. Mahajan, "Performance Analysis of 3G Protocol: Encryption and Authentication," in Proceedings of the Fourth International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks, Ilkley, West Yorkshire, U.K., 2006.
-
(2006)
Proceedings of the Fourth International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks
-
-
Singhrova, A.1
Mahajan, R.2
-
17
-
-
85032128552
-
The Security of the Cipher Block Chaining Message Authentication Code
-
M. Bellare, J. Kilian, and P. Rogaway, "The Security of the Cipher Block Chaining Message Authentication Code," Journal of Computer and System Sciences, vol. 61, no. 3, pp. 362-399, 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
18
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES modes of operation
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES modes of operation," in Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997, pp. 394-403.
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
20
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
New York, NY, USA: ACM Press
-
M. Luk, G. Mezzour, A. Perrig, and V. Gligor, "MiniSec: A secure sensor network communication architecture," in IPSN '07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks. New York, NY, USA: ACM Press, 2007, pp. 479-488.
-
(2007)
IPSN '07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
21
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, November
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, November 2004, pp. 162-175.
-
(2004)
SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
22
-
-
58149134773
-
Minding your MAC Algorithms
-
H. Handschuh and B. Preneel, "Minding your MAC Algorithms," Information Security Bulletin, vol. 9, no. 6, pp. 213-221, 2004.
-
(2004)
Information Security Bulletin
, vol.9
, Issue.6
, pp. 213-221
-
-
Handschuh, H.1
Preneel, B.2
-
23
-
-
72549101635
-
MSP430x13x, MSP430x14x Mixed Signal Controller
-
Texas Instruments, Inc
-
Texas Instruments, Inc., "MSP430x13x, MSP430x14x Mixed Signal Controller," Datasheet, 2001.
-
(2001)
Datasheet
-
-
-
24
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM archive, vol. 13, pp. 422-426, 1970.
-
(1970)
Communications of the ACM archive
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
|