-
1
-
-
3242756924
-
Embedded systems security
-
July
-
P. Koopman, "Embedded systems security," IEEE Computer, vol. 37, no. 7, pp. 95-97, July 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.7
, pp. 95-97
-
-
Koopman, P.1
-
2
-
-
70449466750
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-8, Jan
-
E. A. Lee, "Cyber Physical Systems: Design Challenges," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-8, Jan 2008.
-
(2008)
Cyber Physical Systems: Design Challenges
-
-
Lee, E.A.1
-
4
-
-
0141684229
-
The time-triggered architecture
-
January
-
H. Kopetz and G. Bauer, "The time-triggered architecture," Proceedings of the IEEE, vol. 91, no. 1, pp. 112-126, January 2003.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.1
, pp. 112-126
-
-
Kopetz, H.1
Bauer, G.2
-
5
-
-
84942250391
-
The central guardian approach to enforce fault isolation in the time-triggered architecture
-
G. Bauer, H. Kopetz, and W. Steiner, "The central guardian approach to enforce fault isolation in the time-triggered architecture," in Proceedings of the Sixth International Symposium on Autonomous Decentralized Systems (ISADS 03), Apr. 2003, pp. 37-44.
-
Proceedings of the Sixth International Symposium on Autonomous Decentralized Systems (ISADS 03), Apr. 2003
, pp. 37-44
-
-
Bauer, G.1
Kopetz, H.2
Steiner, W.3
-
10
-
-
85014332650
-
Security in embedded systems: Design challenges
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in embedded systems: Design challenges," ACM Transactions on Embedded Computing Systems (TECS), vol. 3, no. 3, pp. 461-491, 2004.
-
(2004)
ACM Transactions on Embedded Computing Systems (TECS)
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
11
-
-
0001989185
-
A new family of authentication protocols
-
October
-
R. Anderson, F. Bergadano, B. Crispo, J.-H. L. Charalampos, Manifavas, and R. Needham, "A new family of authentication protocols," ACM SIGOPS Operating Systems Review, vol. 32, no. 4, pp. 9-20, October 1998.
-
(1998)
ACM SIGOPS Operating Systems Review
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Charalampos Manifavas, J.-H.L.4
Needham, R.5
-
12
-
-
0003956839
-
-
RFC 2246, Internet Engineering Task Force, January
-
T. Dierks and C. Allen, "The TLS Protocol," RFC 2246, Internet Engineering Task Force, January 1999, http://www.rfc-editor.org/rfc/rfc2246.txt.
-
(1999)
The TLS Protocol
-
-
Dierks, T.1
Allen, C.2
-
14
-
-
84947901848
-
Cryptanalysis of Message Authentication Codes
-
Information Security, 1st International Workshop
-
B. Prenel, "Cryptanalysis of Message Authentication Codes," Lecture Notes In Computer Science; Information Security, 1st International Workshop, vol. 1396, pp. 55-65, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.1396
, pp. 55-65
-
-
Prenel, B.1
-
15
-
-
33750985647
-
-
RFC 4082, Internet Engineering Task Force, June
-
A. Perrig, R. Canetti, D. Song, J. D. Tygar, and B. Briscoe, "Timed efficient stream loss-tolerant authentication (tesla): Multicast source authentication transform introduction," RFC 4082, Internet Engineering Task Force, June 2005, http://www.rfc-editor.org/rfc/rfc4082.txt.
-
(2005)
Timed Efficient Stream Loss-tolerant Authentication (Tesla): Multicast Source Authentication Transform Introduction
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
Briscoe, B.5
-
16
-
-
0001989185
-
A new family of authentication protocols
-
October
-
Ross J. Anderson and Francesco Bergadano and Bruno Crispo and Jong- Hyeon Lee and Charalampos Manifavas and Roger M. Needham, "A new family of authentication protocols," ACMOSR: ACM Operating Systems Review, vol. 32, no. 4, October 1998.
-
(1998)
ACMOSR: ACM Operating Systems Review
, vol.32
, Issue.4
-
-
Anderson, R.J.1
Bergadano, F.2
Crispo, B.3
Lee, J.-H.4
Manifavas, C.5
Needham, R.M.6
-
17
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, no. 11, pp. 770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
18
-
-
0028499968
-
Ordering and Timeliness Requirements of Dependable Real- Time Programs
-
V. Paulo, "Ordering and Timeliness Requirements of Dependable Real- Time Programs," in Real-Time Systems, vol. 7, no. 3, 1994, pp. 105-128.
-
(1994)
Real-Time Systems
, vol.7
, Issue.3
, pp. 105-128
-
-
Paulo, V.1
-
19
-
-
35248833199
-
On the Computation-Storage Trade-Offs of Hash Chain Traversal
-
Y. Sella, "On The Computation-Storage Trade-Offs of Hash Chain Traversal," Lecture Notes in Computer Science, vol. 2742, pp. 270-285, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2742
, pp. 270-285
-
-
Sella, Y.1
-
20
-
-
79958018446
-
Security in embedded systems
-
R. Zurawski, Ed. CRC Press Inc.
-
A. Steffen, "Security in embedded systems." in The Industrial Information Technology Handbook, R. Zurawski, Ed. CRC Press Inc., 2005, pp. 1-12.
-
(2005)
The Industrial Information Technology Handbook
, pp. 1-12
-
-
Steffen, A.1
-
21
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "Spins: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, September 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
22
-
-
38149032366
-
-
Ph.D. dissertation, Technische Universität Wien, Institut für Technische Informatik, Treitlstr. 3/3/182-1, 1040 Vienna, Austria
-
K. Steinhammer, "Design of an FPGA-Based Time-Triggered Ethernet System," Ph.D. dissertation, Technische Universität Wien, Institut für Technische Informatik, Treitlstr. 3/3/182-1, 1040 Vienna, Austria, 2006.
-
(2006)
Design of An FPGA-Based Time-Triggered Ethernet System
-
-
Steinhammer, K.1
-
23
-
-
33744485543
-
The time-triggered ethernet (tte) design
-
H. Kopetz, A. Ademaj, P. Grillinger, and K. Steinhammer, "The time-triggered ethernet (tte) design," in 8th IEEE International Symposium on Object-oriented Real-time distributed Computing (ISORC), May 2005, pp. 22-33.
-
8th IEEE International Symposium on Object-oriented Real-time Distributed Computing (ISORC), May 2005
, pp. 22-33
-
-
Kopetz, H.1
Ademaj, A.2
Grillinger, P.3
Steinhammer, K.4
-
24
-
-
79958015026
-
IEEE 802.3 CSMA/CD (Ethernet)
-
March
-
IEEE 802.3 CSMA/CD (Ethernet), IEEE Standard Part 3, March 2002.
-
(2002)
IEEE Standard Part 3
-
-
-
25
-
-
79957994359
-
-
Francisco Josephinum Wieselburg, Rottenhauserstrasse 1, A3250 Wieselburg, Bericht BLT053322, November
-
H. Prankl and H. Schaufler, "Motortuning zur Leistungssteigerung an Traktoren," Francisco Josephinum Wieselburg, Rottenhauserstrasse 1, A3250 Wieselburg, Bericht BLT053322, November 2006.
-
(2006)
Motortuning Zur Leistungssteigerung An Traktoren
-
-
Prankl, H.1
Schaufler, H.2
-
29
-
-
79957971979
-
-
E. P. S. Group, Online; Accessed 11- November-2010
-
E. P. S. Group, "Ethernet Powerlink Brochure," Online; Accessed 11- November-2010, 2005, http://www.ethernet-powerlink.org.
-
(2005)
Ethernet Powerlink Brochure
-
-
-
32
-
-
33646909480
-
-
RFC 4383, Internet Engineering Task Force, March
-
M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, "The Secure Real-time Transport Protocol (SRTP)," RFC 4383, Internet Engineering Task Force, March 2004, http://www.rfc-editor.org/rfc/rfc4082.txt.
-
(2004)
The Secure Real-time Transport Protocol (SRTP)
-
-
Baugher, M.1
McGrew, D.2
Naslund, M.3
Carrara, E.4
Norrman, K.5
-
33
-
-
0003709134
-
-
RFC 1889, Internet Engineering Task Force, July
-
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications," RFC 1889, Internet Engineering Task Force, July 2003, http://www.rfc-editor.org/rfc/rfc1889.txt.
-
(2003)
RTP: A Transport Protocol for Real-Time Applications
-
-
Schulzrinne, H.1
Casner, S.2
Frederick, R.3
Jacobson, V.4
|