Optimization of message encryption for distributed embedded systems with real-time constraints
暂无分享,去创建一个
[1] Paul Pop,et al. Analysis and Synthesis of Communication-Intensive Heterogeneous Real-Time Systems , 2003 .
[2] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[3] Catherine H. Gebotys. A table masking countermeasure for low-energy secure embedded systems , 2006, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[4] Scott Kirkpatrick,et al. Optimization by Simmulated Annealing , 1983, Sci..
[5] Christof Paar,et al. Cryptography in Embedded Systems : An Overview , 2003 .
[6] Petru Eles,et al. Scheduling with bus access optimization for distributed embedded systems , 2000, IEEE Trans. Very Large Scale Integr. Syst..
[7] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..
[8] Christof Paar,et al. Secure In-Vehicle Communication , 2006 .
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Philip Koopman. Embedded System Security , 2004, Computer.
[11] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[12] Patrick Schaumont,et al. Securing embedded systems , 2006, IEEE Security & Privacy.
[13] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[14] Xiao Qin,et al. Improving security for periodic tasks in embedded systems through scheduling , 2007, TECS.
[15] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[16] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[17] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[18] Krzysztof R. Apt,et al. Constraint logic programming using Eclipse , 2007 .