Security Needs for the Future Intelligent Vehicles
暂无分享,去创建一个
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] Markus G. Kuhn,et al. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations , 1998, Information Hiding.
[3] M. J. Zaman,et al. Bluetooth technology , 2002, IEEE Students Conference, ISCON '02. Proceedings..
[4] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[5] Dave Aitel,et al. The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .
[6] Maxim Raya,et al. Security Aspects of Inter-Vehicle Communications , 2005 .
[7] Richard J. Spillman,et al. Classical and Contemporary Cryptology , 2004 .
[8] Srdjan Capkun,et al. The security and privacy of smart vehicles , 2004, IEEE Security & Privacy Magazine.
[9] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[10] Jun Luo,et al. A Survey of Inter-Vehicle Communication , 2004 .
[11] Christof Paar,et al. Security in Automotive Bus Systems , 2004 .
[12] William Stallings,et al. Cryptography and network security , 1998 .
[13] Markus G. Kuhn,et al. Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP , 1998, IEEE Trans. Computers.
[14] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[15] Tom Denton,et al. Automobile Electrical And Electronic Systems , 1995 .
[16] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[17] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.