메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Formally verifiable features in embedded vehicular security systems

Author keywords

[No Author keywords available]

Indexed keywords

CORE SECURITY TECHNOLOGIES; EMBEDDING SECURITY; FORMAL ANALYSIS; IN-VEHICLE; IT SECURITY; SECURITY MECHANISM; STATE OF THE ART;

EID: 77951264637     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VNC.2009.5416378     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 2
    • 77951293581 scopus 로고    scopus 로고
    • AUTOSAR. http://www.autosar.org.
  • 3
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • Bruno Blanchet. Automatic verification of correspondences for security protocols. Journal of Computer Security, 17(4):363-434, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 6
    • 35248847052 scopus 로고    scopus 로고
    • Hiding Names: Private Authentication in the Applied Pi Calculus
    • ISSS 2002, Springer
    • Cédric Fournet and Martín Abadi. Hiding Names: Private Authentication in the Applied Pi Calculus. In ISSS 2002, volume 2609 of LNCS, pages 317-338. Springer, 2003.
    • (2003) LNCS , vol.2609 , pp. 317-338
    • Fournet, C.1    Abadi, M.2
  • 7
    • 0036267543 scopus 로고    scopus 로고
    • A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks
    • Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, and Hideki Imai. A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Comput. J., 45(3):293-303, 2002.
    • (2002) Comput. J. , vol.45 , Issue.3 , pp. 293-303
    • Hanaoka, G.1    Nishioka, T.2    Zheng, Y.3    Imai, H.4
  • 8
    • 0036147524 scopus 로고    scopus 로고
    • Expanding automotive electronic systems
    • Gabriel Leen and Donal Heffernan. Expanding automotive electronic systems. IEEE Computer, 35(1):88-93, 2002.
    • (2002) IEEE Computer , vol.35 , Issue.1 , pp. 88-93
    • Leen, G.1    Heffernan, D.2
  • 9
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specification
    • IEEE Computer Society
    • Gavin Lowe. A hierarchy of authentication specification. In CSFW '97, pages 31-44. IEEE Computer Society, 1997.
    • (1997) CSFW '97 , pp. 31-44
    • Lowe, G.1
  • 10
    • 84989455644 scopus 로고
    • On the key predistribution system: A practical solution to the key distribution problem
    • CRYPTO 1987, Springer
    • Tsutomu Matsumoto and Hideki Imai. On the key predistribution system: A practical solution to the key distribution problem. In CRYPTO 1987, volume 293 of LNCS, pages 185-193. Springer, 1988.
    • (1988) LNCS , vol.293 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 11
    • 84955583138 scopus 로고    scopus 로고
    • Open Issues in Formal Methods for Cryptographic Protocol Analysis
    • MMM-ACMS 2001
    • C. Meadows. Open Issues in Formal Methods for Cryptographic Protocol Analysis. IN MMM-ACMS 2001, volume 2052 of LNCS, pages 21, 2001.
    • (2001) LNCS , vol.2052 , pp. 21
    • Meadows, C.1
  • 12
    • 77951290674 scopus 로고    scopus 로고
    • A practical implementation of hierarchically structured key predistribution system and its evaluation
    • ISW 2000
    • Daisuke Nojiri, Goichiro Hanaoka, and Hideki Imai. A practical implementation of hierarchically structured key predistribution system and its evaluation. In ISW 2000, volume 1975 of LNCS, pages 224-236, 2000.
    • (2000) LNCS , vol.1975 , pp. 224-236
    • Nojiri, D.1    Hanaoka, G.2    Imai, H.3
  • 14
    • 77951262070 scopus 로고    scopus 로고
    • Pioneer USA - Car navigation
    • Pioneer USA - car navigation, Important: Notice of Free Firmware Update for AVIC F-Series, http://www.pioneerelectronics. com/PUSA/Support/Navigation/ Notice+of+Free+ Firmware+Update+for+AVIC+F-Series
    • Important: Notice of Free Firmware Update for AVIC F-Series
  • 15
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • Douglas R. Stinson. On some methods for unconditionally secure key distribution and broadcast encryption. Des. Codes Cryptography, 12(3):215-243, 1997.
    • (1997) Des. Codes Cryptography , vol.12 , Issue.3 , pp. 215-243
    • Stinson, D.R.1
  • 17
    • 70749106620 scopus 로고    scopus 로고
    • Version 1.2
    • Trusted Computing Group. TPM Specification Version 1.2. https://www.trustedcomputinggroup.org/ downloads/specifications.
    • TPM Specification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.