Authenticating Drivers Using Automotive Batteries
暂无分享,去创建一个
Kang G. Shin | Yuanchao Shu | Liang He | Dongyao Chen | Youngmoon Lee | K. Shin | Liang He | Youngmoon Lee | Yuanchao Shu | Dongyao Chen
[1] Pengcheng Shi,et al. Peg-Free Hand Geometry Recognition Using Hierarchical Geomrtry and Shape Matching , 2002, MVA.
[2] Syed Masud Mahmud,et al. Some attacks against vehicles' passive entry security systems and their solutions , 2003, IEEE Trans. Veh. Technol..
[3] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[4] Peter G. Neumann,et al. Security by obscurity , 2003, CACM.
[5] Amit K. Awasthi,et al. A remote user authentication scheme using smart cards with forward secrecy , 2003, IEEE Trans. Consumer Electron..
[6] Robert P. W. Duin,et al. Prototype selection for dissimilarity-based classifiers , 2006, Pattern Recognit..
[7] Matti Pietikäinen,et al. Face Description with Local Binary Patterns: Application to Face Recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Gang Zheng,et al. Application of Projective Invariants in Hand Geometry Biometrics , 2007, IEEE Transactions on Information Forensics and Security.
[9] Ioannis A. Kakadiaris,et al. Three-Dimensional Face Recognition in the Presence of Facial Expressions: An Annotated Deformable Model Approach , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] K. Fujita,et al. A study of password authentication method against observing attacks , 2008, 2008 6th International Symposium on Intelligent Systems and Informatics.
[11] Hanmin Liu,et al. Improvement on the Cold Cranking Capacity of Commercial Vehicle by Using Supercapacitor and Lead-Acid Battery Hybrid , 2009, IEEE Transactions on Vehicular Technology.
[12] Christof Paar,et al. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed , 2009, AFRICACRYPT.
[13] Pierre Gançarski,et al. A global averaging method for dynamic time warping, with applications to clustering , 2011, Pattern Recognit..
[14] Srdjan Capkun,et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.
[15] Yvo Desmedt,et al. Relay Attack , 2005, Encyclopedia of Cryptography and Security.
[16] Jianbin Hu,et al. Resisting relay attacks on vehicular Passive Keyless Entry and start systems , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[17] Kazuomi Oishi,et al. A Method of Preventing Unauthorized Data Transmission in Controller Area Network , 2012, 2012 IEEE 75th Vehicular Technology Conference (VTC Spring).
[18] Alexandra Dmitrienko,et al. Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer , 2013, CODASPY.
[19] Tomi Kinnunen,et al. I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry , 2013, INTERSPEECH.
[20] Naphtali Rishe,et al. Thermal Imaging as a Biometrics Approach to Facial Signature Authentication , 2013, IEEE Journal of Biomedical and Health Informatics.
[21] Zhen Ling,et al. Blind Recognition of Touched Keys on Mobile Devices , 2014, CCS.
[22] Geoffrey I. Webb,et al. Dynamic Time Warping Averaging of Time Series Allows Faster and More Accurate Classification , 2014, 2014 IEEE International Conference on Data Mining.
[23] Jos Wetzels. Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys , 2014, ArXiv.
[24] Zhilin Zhang,et al. Photoplethysmography-Based Heart Rate Monitoring in Physical Activities via Joint Sparse Spectrum Reconstruction , 2015, IEEE Transactions on Biomedical Engineering.
[25] Jonghyun Choi,et al. Thermal-to-visible face recognition using partial least squares. , 2015, Journal of the Optical Society of America. A, Optics, image science, and vision.
[26] Measuring Strength of Authentication ( Discussion Draft ) Measuring Strength of Authentication , 2015 .
[27] Tomi Kinnunen,et al. Automatic versus human speaker verification: The case of voice mimicry , 2015, Speech Commun..
[28] Muhammad Ali Akbar,et al. Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..
[29] Robert Sykora. The Future of Autonomous Vehicle Technology as a Public Safety Tool , 2015 .
[30] Alexander De Luca,et al. Is secure and usable smartphone authentication asking too much? , 2015, Computer.
[31] Camille Vuillaume,et al. Approaches for Secure and Efficient In-Vehicle Key Management , 2016 .
[32] Kang G. Shin,et al. Error Handling of In-vehicle Networks Makes Them Vulnerable , 2016, CCS.
[33] Xiaoqiang Zhang,et al. A review of li-ion battery equivalent circuit models , 2016 .
[34] Tadayoshi Kohno,et al. Automobile Driver Fingerprinting , 2016, Proc. Priv. Enhancing Technol..
[35] Bruno Bouchard,et al. A Text-Independent Speaker Authentication System for Mobile Devices , 2017, Cryptogr..
[36] Ming Yang,et al. SecTap: Secure Back of Device Input System for Mobile Devices , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[37] Kyong Tak Cho,et al. From Attack to Defense: Toward Secure In-vehicle Networks , 2018 .
[38] Aleksandr Ometov,et al. Multi-Factor Authentication: A Survey , 2018, Cryptogr..