-
1
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, "Experimental security analysis of a modern automobile," in Proc. IEEE Symp. Security Privacy, 2010, pp. 447-462.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
2
-
-
84963904018
-
Privacy protection for preventing data over-collection in smart city
-
to appear in
-
Y. Li, W. Dai, Z. Ming, and M. Qiu, "Privacy protection for preventing data over-collection in smart city," to appear in IEEE Trans. Comput., 2016.
-
(2016)
IEEE Trans. Comput.
-
-
Li, Y.1
Dai, W.2
Ming, Z.3
Qiu, M.4
-
3
-
-
79957990720
-
Authentication in time-triggered systems using time-delayed release of keys
-
A. Wasicek, C. El-Salloum, and H. Kopetz, "Authentication in time-triggered systems using time-delayed release of keys," in Proc. 14th IEEE Int. Symp. Object/Component/Serv.-Oriented Real-Time Distrib. Comput., 2011, pp. 31-39.
-
(2011)
Proc. 14th IEEE Int. Symp. Object/Component/Serv.-Oriented Real-Time Distrib. Comput.
, pp. 31-39
-
-
Wasicek, A.1
El-Salloum, C.2
Kopetz, H.3
-
4
-
-
70449878108
-
Flexible multicast authentication for time-triggered embedded control network applications
-
C. Szilagyi and P. Koopman, "Flexible multicast authentication for time-triggered embedded control network applications," in Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw., 2009, pp. 165-174.
-
(2009)
Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw.
, pp. 165-174
-
-
Szilagyi, C.1
Koopman, P.2
-
5
-
-
0242426103
-
The tesla broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "The tesla broadcast authentication protocol," RSA CryptoBytes, vol. 5, 2005.
-
(2005)
RSA CryptoBytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
6
-
-
84975254355
-
Signal-based automotive communication security and its interplay with safety requirements
-
B. Glas, J. Guajardo, H. Hacioglu, M. Ihle, K. Wehefritz, and A. Yavuz, "Signal-based automotive communication security and its interplay with safety requirements," in Proc. Embedded Security in Cars (ESCAR) Conf., 2012.
-
(2012)
Proc. Embedded Security in Cars (ESCAR) Conf.
-
-
Glas, B.1
Guajardo, J.2
Hacioglu, H.3
Ihle, M.4
Wehefritz, K.5
Yavuz, A.6
-
7
-
-
84987895797
-
Safety and security: Synergies and challenges of integrity-protected bus communication
-
B. Glas and C. Gebauer, "Safety and security: Synergies and challenges of integrity-protected bus communication," in Proc. Embedded Security in Cars (ESCAR) Conf., 2015.
-
(2015)
Proc. Embedded Security in Cars (ESCAR) Conf.
-
-
Glas, B.1
Gebauer, C.2
-
8
-
-
38049156019
-
Chosen-prefix collisions for md5 and colliding x. 509 certificates for different identities
-
M. Stevens, A. Lenstra, and B. De Weger, "Chosen-prefix collisions for md5 and colliding x. 509 certificates for different identities," in Proc. 26th Annu. Int. Conf. Adv. Cryptol., 2007, pp. 1-22.
-
(2007)
Proc. 26th Annu. Int. Conf. Adv. Cryptol.
, pp. 1-22
-
-
Stevens, M.1
Lenstra, A.2
De Weger, B.3
-
9
-
-
84864682117
-
Design, implementation, and evaluation of a vehicular hardware security module
-
M. Wolf and T. Gendrullis, "Design, implementation, and evaluation of a vehicular hardware security module," in Proc. Inf. Security Cryptol., 2012, pp. 302-318.
-
(2012)
Proc. Inf. Security Cryptol.
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
-
10
-
-
82155167643
-
Energy efficient security algorithm for power grid wide area monitoring system
-
Dec.
-
M. Qiu, W. Gao, M. Chen, J.-W. Niu, and L. Zhang, "Energy efficient security algorithm for power grid wide area monitoring system," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 715-723, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 715-723
-
-
Qiu, M.1
Gao, W.2
Chen, M.3
Niu, J.-W.4
Zhang, L.5
-
13
-
-
84903474371
-
Next generation of automotive security: Secure hardware and secure open platforms
-
A. Groll, J. Holle, M. Wolf, and T. Wollinger, "Next generation of automotive security: secure hardware and secure open platforms," in Proc. 17th ITS World Congress, 2010.
-
(2010)
Proc. 17th ITS World Congress
-
-
Groll, A.1
Holle, J.2
Wolf, M.3
Wollinger, T.4
-
14
-
-
84898624749
-
-
Univ. Waterloo, Waterloo, ON, Canada, Tech. Rep
-
M. Juliato and C. Gebotys, "Fpga implementation of an hmac processor based on the sha-2 family of hash functions," Univ. Waterloo, Waterloo, ON, Canada, Tech. Rep, 2011.
-
(2011)
Fpga Implementation of An Hmac Processor Based on the sha-2 Family of Hash Functions
-
-
Juliato, M.1
Gebotys, C.2
-
15
-
-
2442611804
-
An hmac processor with integrated sha-1 and md5 algorithms
-
M.-Y. Wang, C.-P. Su, C.-T. Huang, and C.-W. Wu, "An hmac processor with integrated sha-1 and md5 algorithms," in Proc. Asia South Pacific Des. Autom. Conf., 2004, pp. 456-458.
-
(2004)
Proc. Asia South Pacific Des. Autom. Conf.
, pp. 456-458
-
-
Wang, M.-Y.1
Su, C.-P.2
Huang, C.-T.3
Wu, C.-W.4
-
16
-
-
84862101946
-
Co-design techniques for distributed real-time embedded systems with communication security constraints
-
K. Jiang, P. Eles, and Z. Peng, "Co-design techniques for distributed real-time embedded systems with communication security constraints," in Proc. Des., Autom. Test Eur. Conf. Exhib., 2012, pp. 947-952.
-
(2012)
Proc. Des., Autom. Test Eur. Conf. Exhib.
, pp. 947-952
-
-
Jiang, K.1
Eles, P.2
Peng, Z.3
-
17
-
-
72149115923
-
Flexray schedule optimization of the static segment
-
M. Lukasiewycz, M. Glaß, J. Teich, and P. Milbredt, "Flexray schedule optimization of the static segment," in Proc. 7th IEEE/ ACM Int. Conf. Hardw./Softw. Codes. Syst. Synthesis, 2009, pp. 363-372.
-
(2009)
Proc. 7th IEEE/ ACM Int. Conf. Hardw./Softw. Codes. Syst. Synthesis
, pp. 363-372
-
-
Lukasiewycz, M.1
Glaß, M.2
Teich, J.3
Milbredt, P.4
-
18
-
-
66449109437
-
Message scheduling for the flexray protocol: The static segment
-
Jun.
-
K. Schmidt and E. G. Schmidt, "Message scheduling for the flexray protocol: The static segment," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2170-2179, Jun. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.5
, pp. 2170-2179
-
-
Schmidt, K.1
Schmidt, E.G.2
-
19
-
-
80455129099
-
Reliabilityaware frame packing for the static segment of flexray
-
B. Tanasa, U. Dutta Bordoloi, P. Eles, and Z. Peng, "Reliabilityaware frame packing for the static segment of flexray," in Proc. 9th ACM Int. Conf. Embedded Softw., 2011, pp. 175-184.
-
(2011)
Proc. 9th ACM Int. Conf. Embedded Softw.
, pp. 175-184
-
-
Tanasa, B.1
Dutta Bordoloi, U.2
Eles, P.3
Peng, Z.4
-
20
-
-
84902595503
-
Scheduling of time triggered messages in static segment of flexray
-
A. Darbandi, S. Kwon, and M. K. Kim, "Scheduling of time triggered messages in static segment of flexray," Int. J. Softw. Eng. Its Appl., vol. 8, no. 6, pp. 195-208, 2014.
-
(2014)
Int. J. Softw. Eng. Its Appl.
, vol.8
, Issue.6
, pp. 195-208
-
-
Darbandi, A.1
Kwon, S.2
Kim, M.K.3
-
22
-
-
79951576405
-
Schedule optimization of time-triggered systems communicating over the flexray static segment
-
Feb.
-
H. Zeng, M. Di Natale, A. Ghosal, and A. Sangiovanni-Vincentelli, "Schedule optimization of time-triggered systems communicating over the flexray static segment," IEEE Trans. Indus. Informat., vol. 7, no. 1, pp. 1-17, Feb. 2011.
-
(2011)
IEEE Trans. Indus. Informat.
, vol.7
, Issue.1
, pp. 1-17
-
-
Zeng, H.1
Di Natale, M.2
Ghosal, A.3
Sangiovanni-Vincentelli, A.4
-
23
-
-
70350053119
-
Optimizations of an application-level protocol for enhanced dependability in flexray
-
W. Li, M. Di Natale, W. Zheng, P. Giusto, A. Sangiovanni-Vincentelli, and S. Seshia, "Optimizations of an application-level protocol for enhanced dependability in flexray," in Proc. Des., Autom. Test Eur. Conf. Exhib., 2009, pp. 1076-1081.
-
(2009)
Proc. Des., Autom. Test Eur. Conf. Exhib.
, pp. 1076-1081
-
-
Li, W.1
Di Natale, M.2
Zheng, W.3
Giusto, P.4
Sangiovanni-Vincentelli, A.5
Seshia, S.6
-
24
-
-
77953089196
-
Computing robustness of flexray schedules to uncertainties in design parameters
-
A. Ghosal, H. Zeng, M. Di Natale, and Y. Ben-Haim, "Computing robustness of flexray schedules to uncertainties in design parameters," in Proc. Conf. Des., Autom. Test Eur., 2010, pp. 550-555.
-
(2010)
Proc. Conf. Des., Autom. Test Eur.
, pp. 550-555
-
-
Ghosal, A.1
Zeng, H.2
Di Natale, M.3
Ben-Haim, Y.4
-
25
-
-
84889098665
-
Optimizing the implementation of real-time simulink models onto distributed automotive architectures
-
Nov.
-
G. Han, M. Di Natale, H. Zeng, X. Liu, and W. Dou, "Optimizing the implementation of real-time simulink models onto distributed automotive architectures," J. Syst. Archit., vol. 59, no. 10, pp. 1115-1127, Nov. 2013.
-
(2013)
J. Syst. Archit.
, vol.59
, Issue.10
, pp. 1115-1127
-
-
Han, G.1
Di Natale, M.2
Zeng, H.3
Liu, X.4
Dou, W.5
-
26
-
-
84893388821
-
Security-aware mapping for can-based real-time distributed automotive systems
-
C.-W. Lin, Q. Zhu, C. Phung, and A. Sangiovanni-Vincentelli, "Security-aware mapping for can-based real-time distributed automotive systems," in Proc. IEEE/ACM Int. Conf. Comput.-Aided Des., 2013, pp. 115-121.
-
(2013)
Proc. IEEE/ACM Int. Conf. Comput.-Aided Des.
, pp. 115-121
-
-
Lin, C.-W.1
Zhu, Q.2
Phung, C.3
Sangiovanni-Vincentelli, A.4
-
27
-
-
84936865209
-
Securityaware mapping for tdma-based real-time distributed systems
-
C.-W. Lin, Q. Zhu, and A. Sangiovanni-Vincentelli, "Securityaware mapping for tdma-based real-time distributed systems," in Proc. IEEE/ACM Int. Conf. Comput.-Aided Des., 2014, pp. 24-31.
-
(2014)
Proc. IEEE/ACM Int. Conf. Comput.-Aided Des.
, pp. 24-31
-
-
Lin, C.-W.1
Zhu, Q.2
Sangiovanni-Vincentelli, A.3
-
28
-
-
85027949525
-
A survey of broadcast authentication schemes for wireless networks
-
K. Grover and A. Lim, "A survey of broadcast authentication schemes for wireless networks," Ad Hoc Netw., vol. 24, pp. 288-316, 2015.
-
(2015)
Ad Hoc Netw.
, vol.24
, pp. 288-316
-
-
Grover, K.1
Lim, A.2
-
30
-
-
84907463040
-
Efficient algorithms for schedulability analysis and priority assignment for fixed-priority preemptive scheduling with offsets
-
Z. Gu and H. Cai, "Efficient algorithms for schedulability analysis and priority assignment for fixed-priority preemptive scheduling with offsets," Int. J. Embedded Syst., vol. 6, no. 4, pp. 303-318, 2014.
-
(2014)
Int. J. Embedded Syst.
, vol.6
, Issue.4
, pp. 303-318
-
-
Gu, Z.1
Cai, H.2
-
32
-
-
29244485138
-
A ga-based scheduling method for flexray systems
-
S. Ding, N. Murakami, H. Tomiyama, and H. Takada, "A ga-based scheduling method for flexray systems," in Proc. 5th ACM Int. Conf. Embedded Softw., 2005, pp. 110-113.
-
(2005)
Proc. 5th ACM Int. Conf. Embedded Softw.
, pp. 110-113
-
-
Ding, S.1
Murakami, N.2
Tomiyama, H.3
Takada, H.4
|