-
2
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device,
-
S. C. Bono, M. Green, and A. Stubblefiled, "Security analysis of a cryptographically-enabled RFID device, " in Proc. 14th Conf. Usenix Security Symp., 2005, vol. 14, pp. 10-16.
-
(2005)
Proc. 14th Conf. Usenix Security Symp
, vol.14
, pp. 10-16
-
-
Bono, S.C.1
Green, M.2
Stubblefiled, A.3
-
3
-
-
84907690998
-
An analysis of bluetooth security vulnerabilities,
-
C. T. Hager and S. F. Midkiff, "An analysis of bluetooth security vulnerabilities, " in Proc. IEEE 2003 Wireless Communications and Network, 2003, vol. 3, pp. 1825-1831.
-
(2003)
Proc. IEEE 2003 Wireless Communications and Network
, vol.3
, pp. 1825-1831
-
-
Hager, C.T.1
Midkiff, S.F.2
-
4
-
-
13444301344
-
Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs
-
A. I. Alrabady and S. M. Mahmud, "Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs, " IEEE Trans. Veh. Technol., vol. 54, no. 1, pp. 41-50, 2005.
-
(2005)
IEEE Trans. Veh. Technol
, vol.54
, Issue.1
, pp. 41-50
-
-
Alrabady, A.I.1
Mahmud, S.M.2
-
8
-
-
54249143639
-
Linear slide attacks on the Keeloq cipher,
-
Proc. 3rd SKLOIS Conf. Information Security and Cryptology, Springer-Verlag
-
A. Bogdanov, "Linear slide attacks on the Keeloq cipher, " in Proc. 3rd SKLOIS Conf. Information Security and Cryptology, LNCS, Springer-Verlag, 2007, pp. 66-80.
-
(2007)
LNCS
, pp. 66-80
-
-
Bogdanov, A.1
-
9
-
-
44449126213
-
A practical attack on Keeloq,
-
Advances in Cryptology EUROCRYPT 2008, N. Smart, Ed. New York: Springer-Verlag
-
S. Indesteege, N. Keller, E. Biham, O. Dunkelman, and B. Preneel, "A practical attack on Keeloq, " in Advances in Cryptology EUROCRYPT 2008 (Lecture Notes in Computer Science 4965), N. Smart, Ed. New York: Springer-Verlag, 2008, pp. 1-18.
-
(2008)
Lecture Notes in Computer Science
, vol.4965
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Biham, E.3
Dunkelman, O.4
Preneel, B.5
-
10
-
-
84957610784
-
Slide attacks,
-
Proc. FSE'99 , Springer-Verlag
-
A. Biryukov and D. Wanger, "Slide attacks, " in Proc. FSE'99 (LNCS, vol. 1636), Springer-Verlag, 1999, pp. 245-259.
-
(1999)
LNCS
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wanger, D.2
-
11
-
-
84948988609
-
Advanced slide attacks,
-
Proc. EURO- CRYPT'00 , Springer-Verlag
-
A. Biryukov and D. Wanger, "Advanced slide attacks, " in Proc. EURO- CRYPT'00 (LNCS, vol. 1807), Springer-Verlag, 2000, pp. 589-606.
-
(2000)
LNCS
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wanger, D.2
-
12
-
-
84869347409
-
-
Available
-
(2009). Available: http://www.autoalarmpro.com/bypass-kits
-
-
-
-
13
-
-
84869373480
-
-
Available
-
(2009). Available: http://www.bypasskit.com/
-
-
-
-
14
-
-
84869377659
-
-
Available
-
(2009). Available: http://oem-auto-accessory.com/bypass-kits-.html
-
-
-
-
15
-
-
70449488661
-
Certificate revocation in vehicular ad hoc networks,
-
LCA, de Lausanne Switzerland Tech. LCA-Rep. 2006-006
-
D. Jungles, M. Rava, and P. Papadimitratos, "Certificate revocation in vehicular ad hoc networks, " LCA, de Lausanne Switzerland Tech. LCA-Rep. 2006-006, 2006.
-
(2006)
-
-
Jungles, D.1
Rava, M.2
Papadimitratos, P.3
-
16
-
-
44649186182
-
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
-
J. T. Isaac, J. S. Camara, S. Zeadally, and J. T. Marquez, "A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks, " Comput. Commun., vol. 31, no. 10, pp. 2478-2484, 2008.
-
(2008)
Comput. Commun
, vol.31
, Issue.10
, pp. 2478-2484
-
-
Isaac, J.T.1
Camara, J.S.2
Zeadally, S.3
Marquez, J.T.4
-
17
-
-
34547379990
-
Priority based inter-vehicle communication in vehicular ad-hoc networks using IEEE 802.11e,
-
Apr
-
C. Suthaputchakun and A. Ganz, "Priority based inter-vehicle communication in vehicular ad-hoc networks using IEEE 802.11e, " in Proc. IEEE Conf. 65th Vehicular Technology, Apr. 2007, pp. 1595-2599.
-
(2007)
Proc. IEEE Conf. 65th Vehicular Technology
, pp. 1595-2599
-
-
Suthaputchakun, C.1
Ganz, A.2
-
18
-
-
34547354916
-
A novel MAC protocol for throughput sensitivity applications in vehicular environments,
-
Apr
-
Y. Zang and L. Stibor, "A novel MAC protocol for throughput sensitivity applications in vehicular environments, " in Proc. IEEE Conf 65th Vehicular Technology, Apr. 2007, pp. 2550-2554.
-
(2007)
Proc. IEEE Conf 65th Vehicular Technology
, pp. 2550-2554
-
-
Zang, Y.1
Stibor, L.2
-
19
-
-
36749036607
-
A stable routing protocol to support ITS services in VANET networks
-
T. Taleb and E. Sakhaee, "A stable routing protocol to support ITS services in VANET networks, " IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3337-3343, 2007.
-
(2007)
IEEE Trans. Veh. Technol
, vol.56
, Issue.6
, pp. 3337-3343
-
-
Taleb, T.1
Sakhaee, E.2
-
20
-
-
48749094932
-
A performance modeling of connectivity in vehicular ad hoc networks (VANETs)
-
M. Khabazian and M. K. Hehmet Ali, "A performance modeling of connectivity in vehicular ad hoc networks (VANETs), " IEEE Trans. Veh. Technol., vol. 57, no. 4, pp. 2440-2450, 2003.
-
(2003)
IEEE Trans. Veh. Technol
, vol.57
, Issue.4
, pp. 2440-2450
-
-
Khabazian, M.1
Hehmet Ali, M.K.2
-
21
-
-
36749104228
-
Conditional transmissions: Performance study of a new communication strategy in VANET
-
B. Ducourthial, Y. Khaled, and M. Shawky, "Conditional transmissions: Performance study of a new communication strategy in VANET, " IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3348-3357, 2007.
-
(2007)
IEEE Trans. Veh. Technol
, vol.56
, Issue.6
, pp. 3348-3357
-
-
Ducourthial, B.1
Khaled, Y.2
Shawky, M.3
-
24
-
-
34247328623
-
Detection and localization of Sybil nodes in VANETs,
-
Sept
-
B. Xiao, B. Yu, and C. Gao, "Detection and localization of Sybil nodes in VANETs, " in Proc. 2006 Workshop Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Sept. 2006, pp. 1-8.
-
(2006)
Proc. 2006 Workshop Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
27
-
-
34047139459
-
Modeling the spread of worm epidemics in vehicular ad hoc networks,
-
M. Nekovee, "Modeling the spread of worm epidemics in vehicular ad hoc networks, " in Proc. IEEE Conf. 63rd Vehicular Technology, 2006, vol. 2, pp. 3348-3357.
-
(2006)
Proc. IEEE Conf. 63rd Vehicular Technology
, vol.2
, pp. 3348-3357
-
-
Nekovee, M.1
-
28
-
-
35349016950
-
AMOEBA: Robust location privacy scheme for VANET
-
K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, "AMOEBA: Robust location privacy scheme for VANET, " IEEE J. Select Areas Commun., vol. 25, no. 8, pp. 1569-1589, 2007.
-
(2007)
IEEE J. Select Areas Commun
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
29
-
-
46749099829
-
Providing VANET security through active position detection
-
G. Yan, S. Olariu, and M. C. Weigle, "Providing VANET security through active position detection, " Comput. Commun., vol. 31, no. 12, pp. 2883-2897, 2008.
-
(2008)
Comput. Commun
, vol.31
, Issue.12
, pp. 2883-2897
-
-
Yan, G.1
Olariu, S.2
Weigle, M.C.3
-
30
-
-
84869365922
-
-
Online, Available
-
E. R. Harold. (2009). Fuzzing testing [Online]. Available: http://www.ibm.com/developerworks/java/library/j-fuzztest.html
-
(2009)
Fuzzing testing
-
-
Harold, E.R.1
-
32
-
-
0036684901
-
Creating high confidence in a separation kernel
-
W. B. Martin, P. D. Whilte, and F. S. Taylor, "Creating high confidence in a separation kernel, " Automat. Softw Eng., vol. 9, no. 3, pp. 263-284, 2002.
-
(2002)
Automat. Softw Eng
, vol.9
, Issue.3
, pp. 263-284
-
-
Martin, W.B.1
Whilte, P.D.2
Taylor, F.S.3
-
33
-
-
84869363842
-
-
is still that hard: Deconstructing Xbox 360 security [Online, Available
-
M. Steil. (2009). Why silicon-based security is still that hard: Deconstructing Xbox 360 security [Online]. Available: http://events. ccc.de/congress/2007/Fahrplan/events/2279.en.html
-
(2009)
Why silicon-based security
-
-
Steil, M.1
|