Embedded Security in Cars

[1]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[2]  M. McMorrow Telematics - exploiting its potential , 2004 .

[3]  Azim Eskandarian,et al.  Research advances in intelligent collision avoidance and adaptive cruise control , 2003, IEEE Trans. Intell. Transp. Syst..

[4]  Lars Wischhof,et al.  Adaptive broadcast for travel and traffic information distribution based on inter-vehicle communication , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).

[5]  Richard Truett TELEMATICS EXECS SEEK A NEW ROUTE , 2002 .

[6]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[7]  A. Rother,et al.  Krisenkommunikation in der Automobilindustrie. Eine inhaltsanalytische Studie am Beispiel der Mercedes-Benz A-Klasse , 2002 .

[8]  Christof Paar,et al.  Elliptic Curve Cryptography on a Palm OS Device , 2001, ACISP.

[9]  Christof Paar,et al.  A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware , 2001, CHES.

[10]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[11]  S. Klein,et al.  Geschäftsmodelle in der New Economy , 2001 .

[12]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[13]  Christof Paar,et al.  Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.

[14]  Richard Evans,et al.  Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems , 2000, SAFECOMP.

[15]  K. Tokuda,et al.  DOLPHIN for inter-vehicle communications system , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).

[16]  Hannes Federrath,et al.  Gliederung und Systematisierung von Schutzzielen in IT-Systemen , 2000, Datenschutz und Datensicherheit.

[17]  Ross J. Anderson On the Security of Digital Tachographs , 1998, ESORICS.

[18]  Paul Timmers,et al.  Business Models for Electronic Markets , 1998, Electron. Mark..

[19]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[20]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[21]  Hilarie K. Orman,et al.  Fast Key Exchange with Elliptic Curve Systems , 1995, CRYPTO.

[22]  Nancy A. Lynch,et al.  A New Fault-Tolerance Algorithm for Clock Synchronization , 1988, Inf. Comput..

[23]  Holger Sedlak,et al.  The RSA Cryptography Processor , 1987, EUROCRYPT.

[24]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[25]  Joan V. Robinson Economics of imperfect competition , 1969 .