메뉴 건너뛰기




Volumn , Issue , 2009, Pages 165-174

Flexible multicast authentication for time-triggered embedded control network applications

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION LEVEL; AUTHENTICATION COST; AUTHENTICATION SCHEME; EMBEDDED CONTROL; EMBEDDED CONTROL SYSTEMS; EMBEDDED NETWORK; MESSAGE AUTHENTICATION CODES; MULTICASTS; REPLAY ATTACK; TIME TRIGGERED; UPPER BOUND;

EID: 70449878108     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2009.5270342     Document Type: Conference Paper
Times cited : (49)

References (30)
  • 1
    • 33750955777 scopus 로고    scopus 로고
    • FlexRay Communications System Protocol Specification, Version 2.1, Rev. A
    • FlexRay Consortium, Dec
    • FlexRay Consortium. FlexRay Communications System Protocol Specification, Version 2.1, Rev. A, Dec. 2005.
    • (2005)
  • 3
    • 70449790692 scopus 로고    scopus 로고
    • R. Bosch GmbH, CAN Specification, Ver. 2, Sep. 1991.
    • R. Bosch GmbH, CAN Specification, Ver. 2, Sep. 1991.
  • 11
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
    • T. Hoppe and J. Dittman. Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy. In 2nd Workshop on Embedded Systems Security (WESS), 2007.
    • (2007) 2nd Workshop on Embedded Systems Security (WESS)
    • Hoppe, T.1    Dittman, J.2
  • 23
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA Broadcast Authentication Protocol
    • A. Perrig, R. Canetti, J. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, vol. 5, pp. 2-13, 2002.
    • (2002) RSA CryptoBytes , vol.5 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tygar, J.3    Song, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.