-
1
-
-
33750955777
-
FlexRay Communications System Protocol Specification, Version 2.1, Rev. A
-
FlexRay Consortium, Dec
-
FlexRay Consortium. FlexRay Communications System Protocol Specification, Version 2.1, Rev. A, Dec. 2005.
-
(2005)
-
-
-
3
-
-
70449790692
-
-
R. Bosch GmbH, CAN Specification, Ver. 2, Sep. 1991.
-
R. Bosch GmbH, CAN Specification, Ver. 2, Sep. 1991.
-
-
-
-
4
-
-
85084161952
-
PGP in constrained wireless devices
-
M. Brown, D. Cheung, D. Hankerson, J. L. Hernandez, M. Kirkup, and A. Menezes. PGP in constrained wireless devices. In SSYM'00: Proc. of the 9th Conf. on USENIX Security Symposium, pp. 19-34, 2000.
-
(2000)
SSYM'00: Proc. of the 9th Conf. on USENIX Security Symposium
, pp. 19-34
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.L.4
Kirkup, M.5
Menezes, A.6
-
5
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
IEEE
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: a taxonomy and some efficient constructions. In INFOCOM '99: Proc. 18th Annual Joint Conf. of the IEEE Computer and Communications Societies, vol. 2, pp. 708-716. IEEE, 1999.
-
(1999)
INFOCOM '99: Proc. 18th Annual Joint Conf. of the IEEE Computer and Communications Societies
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
33745162593
-
Achieving Confidentiality Security Service for CAN
-
M. Chavez, C. Rosete, and F. Henriquez. Achieving Confidentiality Security Service for CAN. In CONIELE-COMP '05: Proc. of the 15th Int'l Conf. on Electronics, Communications and Computers, pp. 166-170, 2005.
-
(2005)
CONIELE-COMP '05: Proc. of the 15th Int'l Conf. on Electronics, Communications and Computers
, pp. 166-170
-
-
Chavez, M.1
Rosete, C.2
Henriquez, F.3
-
9
-
-
33144472210
-
Secure time synchronization service for sensor networks
-
ACM
-
S. Ganeriwal, S. Čapkun, C.-C. Han, and M. B. Srivastava. Secure time synchronization service for sensor networks. In WiSe '05: Proc. of the 4th ACM Workshop on Wireless Security, pp. 97-106. ACM, 2005.
-
(2005)
WiSe '05: Proc. of the 4th ACM Workshop on Wireless Security
, pp. 97-106
-
-
Ganeriwal, S.1
Čapkun, S.2
Han, C.-C.3
Srivastava, M.B.4
-
11
-
-
56449111413
-
Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
-
T. Hoppe and J. Dittman. Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy. In 2nd Workshop on Embedded Systems Security (WESS), 2007.
-
(2007)
2nd Workshop on Embedded Systems Security (WESS)
-
-
Hoppe, T.1
Dittman, J.2
-
17
-
-
38149089543
-
Future Perspectives: The car and its IP address - A potential safety and security risk assessment
-
Springer-Verlag
-
A. Lang, J. Dittman, S. Kiltz, and T. Hoppe. Future Perspectives: The car and its IP address - A potential safety and security risk assessment. In Proc. of the 26th Int'l Conf. on Computer Safety, Reliability and Security (SAFECOMP), pp. 40-53. Springer-Verlag, 2007.
-
(2007)
Proc. of the 26th Int'l Conf. on Computer Safety, Reliability and Security (SAFECOMP)
, pp. 40-53
-
-
Lang, A.1
Dittman, J.2
Kiltz, S.3
Hoppe, T.4
-
23
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
A. Perrig, R. Canetti, J. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, vol. 5, pp. 2-13, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
24
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. SPINS: security protocols for sensor networks. Wireless Networks, vol. 8(no. 5):pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
25
-
-
0033690336
-
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
-
A. Perrig, J. D. Tygar, D. Song, and R. Canetti. Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In SP '00: Proc. of the 2000 IEEE Symposium on Security and Privacy, pp. 56-73, 2000.
-
(2000)
SP '00: Proc. of the 2000 IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Tygar, J.D.2
Song, D.3
Canetti, R.4
-
27
-
-
0003851399
-
-
in C. John Wiley & Sons, Inc, New York, NY, USA
-
Schneier. Applied Cryptography (2nd ed.): Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York, NY, USA, 1995.
-
(1995)
Applied Cryptography (2nd ed.): Protocols, Algorithms, and Source Code
-
-
Schneier1
|