-
2
-
-
77955211983
-
Security threats to automotive can networks
-
LNCS5219, Springer
-
Tobias Hoppe ,Stefan Kiltz , Jana Dittmana , "Security threats to automotive CAN networks", SAFECOMP 2008,LNCS5219, Springer,2008.
-
(2008)
SAFECOMP
, vol.2008
-
-
Hoppe, T.1
Kiltz, S.2
Dittmana, J.3
-
3
-
-
0033716116
-
Bit permutation instructions for accelerating software cryptography
-
Proceedings.IEEE International Conference, JULY
-
Zhijee Shi, Ruby B.Lee, "Bit permutation instructions for accelerating software cryptography", Application-Specific Systems, Architectures, and Processors, 2000 Proceedings.IEEE International Conference, JULY 2000.
-
(2000)
Application-Specific Systems, Architectures, and Processors
, vol.2000
-
-
Shi, Z.1
Lee, R.B.2
-
4
-
-
84894240858
-
Security issues in vehicular system
-
SAR-SSI2010, EVITA project
-
Hendrik Schweppe,Yves Roudier,"Security issues in vehicular system", SAR-SSI2010,5TH conference on network architectures and information system security, EVITA project, 2010.
-
5TH conference on network architectures and information system security
, vol.2010
-
-
Schweppe, H.1
Roudier, Y.2
-
5
-
-
84894274956
-
The evita hardware security module
-
Hamburg, Nov, EVITA project
-
Marko Wolf, "The EVITA hardware security module", Embedded security in cars conference, Hamburg,Nov2009, EVITA project,2009.
-
(2009)
Embedded security in cars conference
, vol.2009
-
-
Wolf, M.1
-
6
-
-
84868693261
-
Secure automotive on-board electronics network architecture
-
Budapest, Hungary, May/June
-
L.Apvrille, R.El Khayari, O.Henniger, Y.Roudier, H.Schweppe, H.Seudié, B.Weyl, M.Wolf, Secure automotive on-board electronics network architecture, FISITA 2010 World automotive congress, Budapest, Hungary, May/June 2010.
-
(2010)
FISITA 2010 World automotive congress
-
-
Apvrille, L.1
Khayari, R.E.2
Henniger, O.3
Roudier, Y.4
Schweppe, H.5
Seudié, H.6
Weyl, B.7
Wolf, M.8
-
7
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Oakland, CA, May 2010
-
Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, and Tadayoshi Kohno" , Experimental security analysis of a modern automobile" , IEEE symposium on security and privacy, Oakland, CA, May 2010.
-
IEEE symposium on security and privacy
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
-
8
-
-
52249087977
-
-
IEEE Transactions on Industrial Informatics Aug
-
Falk Salewski, Stefan Kowalewski, "Hardware/Software design consideration for automotive embedded system" , IEEE Transactions on Industrial Informatics, Vol.4 , No.3, Aug 2008.
-
(2008)
Hardware/Software design consideration for automotive embedded system
, vol.4
, Issue.3
-
-
Salewski, F.1
Kowalewski, S.2
-
9
-
-
3042639781
-
On permutation operations in cipher design
-
Proceedings, ITCC 2004, International Conference, April
-
Ruby B.Lee, Z.J.Shi and Y.L.Yin,Ronald L.Rivest M.J.B.Robshaw, "On permutation operations in cipher design", Information technology coding and computing, 2004 Proceedings, ITCC 2004, International Conference 5-7 April 2004.
-
(2004)
Information technology coding and computing
, vol.2004
, pp. 5-7
-
-
Lee, R.B.1
Shi, Z.J.2
YinRonald, Y.L.3
Rivest, L.4
Robshaw, M.J.B.5
-
10
-
-
84903459916
-
Design, implementation and evaluation of a vehicular hardware security module
-
Seoul, South Korea, November/December
-
Marko Wolf, Timo Gendrullis , "Design, implementation and evaluation of a vehicular hardware security module", 14th International conference on information security and cryptology, Seoul, South Korea, November/December 2011 .
-
(2011)
14th International conference on information security and cryptology
-
-
Wolf, M.1
Gendrullis, T.2
-
12
-
-
84894240658
-
Embedded security in automobiles
-
Nuremberg,Germany,Feb
-
J.Pelzl, Marko wolf, T.Wollinger, Dr.Simon Burton , "Embedded security in automobiles", Embedded World Conference ,Nuremberg,Germany,Feb- 2013.
-
(2013)
Embedded World Conference
-
-
Pelzl, J.1
Wolf, M.2
Wollinger, T.3
Burton Dr., S.4
-
13
-
-
34250161819
-
-
IEEE Transactions on VLSI systems June
-
Giorgos Dimitrakopoulos, Christos Mavrokefalidis, Kostas Galanopoulos and Dimitris Niolos, "Sorter based permutation units for media enhanced processors" IEEE Transactions on VLSI systems, vol 15, no.6, pp 711-715, June 2007.
-
(2007)
Sorter based permutation units for media enhanced processors
, vol.15
, Issue.6
, pp. 711-715
-
-
Dimitrakopoulos, G.1
Mavrokefalidis, C.2
Galanopoulos, K.3
Niolos, D.4
-
15
-
-
85061034567
-
Comprehensive experimental analysis of automotive attack surfaces
-
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno , "Comprehensive experimental analysis of automotive attack surfaces" ,USENIXSecurity,August10-12,2011.
-
(2011)
USENIXSecurity,August
, pp. 10-12
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
16
-
-
84870517271
-
Using virtual secure circuit to protect embedded software from side channel attacks
-
JAN
-
Zhimin chen , Ambuj sinha , Patrick schaumont , "Using virtual secure circuit to protect embedded software from side channel attacks" , IEEE Transactions on Computers, VOL 62, NO 1 ,JAN-13.
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.1
-
-
Chen, Z.1
Sinha, A.2
Schaumont, P.3
-
17
-
-
38049027261
-
Masking and dual rail logic don't add up
-
Springer, vienna, Austria
-
Patrick Schaumont and Kris Tiri , "Masking and dual rail logic don't add up" ,CHES, LNCS, vol.4727, Springer, 2007, pp.95-106, vienna, Austria,2007.
-
(2007)
Ches, Lncs
, vol.4727
, Issue.2007
, pp. 95-106
-
-
Schaumont, P.1
Tiri, K.2
-
18
-
-
0345382713
-
Domain specific codesign for embedded security
-
April
-
Patrick Schaumont, Ingrid Verbauwhede, "Domain specific codesign for embedded security", IEEE Computer, vol.36, no.4, pp.68-74, April 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.4
, pp. 68-74
-
-
Schaumont, P.1
Verbauwhede, I.2
-
19
-
-
84862149386
-
Securing car2x applications with effective hardware-software co-design for vehicular on-board networks
-
Berlin, Germany, October, VDI Berichte
-
H.Schweppe, B.Weyl, Y.Roudier, M.S.Idrees, T.Gendrullis, M.Wolf, "Securing car2X applications with effective hardware-software co-design for vehicular on-board networks",27th Joint VDI/VW Automotive Security Conference, Berlin, Germany, October 2011.VDI Berichte 2131,2011.
-
(2011)
27th Joint VDI/VW Automotive Security Conference
, vol.2011
, pp. 21-31
-
-
Schweppe, H.1
Weyl, B.2
Roudier, Y.3
Idrees, M.S.4
Gendrullis, T.5
Wolf, M.6
-
20
-
-
33646430870
-
-
IEEE Security & Privacy
-
David Hwang P.Schaumont, K.Tiri, and I.Verbauwhede, "Securing embedded system" , IEEE Security & Privacy, 4(2):40-49, 2006.
-
(2006)
Securing embedded system
, vol.4
, Issue.2
, pp. 40-49
-
-
Hwang, D.1
Schaumont, P.2
Tiri, K.3
Verbauwhede, I.4
-
21
-
-
84894277621
-
Hardware implementation of low power audio sub word sorter unit for high security transmission
-
June
-
Karthigaikumar , K Baskaran, "Hardware implementation of low power audio sub word sorter unit for high security transmission", International Journal of Computer and Electrical Engineering, Vol.1, No.2, June 2009.
-
(2009)
International Journal of Computer and Electrical Engineering
, vol.1
, Issue.2
-
-
Kumar, K.1
Baskaran, K.2
-
22
-
-
84903474371
-
Next generation of automotive security: Secure hardware and secure open platform
-
Andre Grol, Jan Holle , Marko Wolf, Thomas wollinger , "Next generation of automotive security: secure hardware and secure open platform", 17th ITS World Congress.2010.
-
17th ITS World Congress
, vol.2010
-
-
Grol, A.1
Holle, J.2
Wolf, M.3
Wollinger, T.4
-
23
-
-
66149136922
-
Trustworthy privacy preserving car generated announcement in vehicular adhoc networks
-
May
-
Vanesa Daza, Josep Domingo-Ferrer, Francesc Sebé and Alexandre Viejo, "Trustworthy privacy preserving car generated announcement in vehicular adhoc networks", IEEE Transaction on Vehicular Technology, Vol.58, No.4, May 2009.
-
(2009)
IEEE Transaction on Vehicular Technology
, vol.58
, Issue.4
-
-
Daza, V.1
Domingo-Ferrer, J.2
Sebé, F.3
Viejo, A.4
|