Embedded Security in Cars
暂无分享,去创建一个
Christof Paar | Kerstin Lemke | Marko Wolf | C. Paar | K. Lemke | M. Wolf
[1] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[2] M. McMorrow. Telematics - exploiting its potential , 2004 .
[3] Azim Eskandarian,et al. Research advances in intelligent collision avoidance and adaptive cruise control , 2003, IEEE Trans. Intell. Transp. Syst..
[4] Lars Wischhof,et al. Adaptive broadcast for travel and traffic information distribution based on inter-vehicle communication , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).
[5] Richard Truett. TELEMATICS EXECS SEEK A NEW ROUTE , 2002 .
[6] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[7] A. Rother,et al. Krisenkommunikation in der Automobilindustrie. Eine inhaltsanalytische Studie am Beispiel der Mercedes-Benz A-Klasse , 2002 .
[8] Christof Paar,et al. Elliptic Curve Cryptography on a Palm OS Device , 2001, ACISP.
[9] Christof Paar,et al. A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware , 2001, CHES.
[10] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[11] S. Klein,et al. Geschäftsmodelle in der New Economy , 2001 .
[12] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[13] Christof Paar,et al. Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.
[14] Richard Evans,et al. Derivation of Safety Targets for the Random Failure of Programmable Vehicle Based Systems , 2000, SAFECOMP.
[15] K. Tokuda,et al. DOLPHIN for inter-vehicle communications system , 2000, Proceedings of the IEEE Intelligent Vehicles Symposium 2000 (Cat. No.00TH8511).
[16] Hannes Federrath,et al. Gliederung und Systematisierung von Schutzzielen in IT-Systemen , 2000, Datenschutz und Datensicherheit.
[17] Ross J. Anderson. On the Security of Digital Tachographs , 1998, ESORICS.
[18] Paul Timmers,et al. Business Models for Electronic Markets , 1998, Electron. Mark..
[19] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[20] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[21] Hilarie K. Orman,et al. Fast Key Exchange with Elliptic Curve Systems , 1995, CRYPTO.
[22] Nancy A. Lynch,et al. A New Fault-Tolerance Algorithm for Clock Synchronization , 1988, Inf. Comput..
[23] Holger Sedlak,et al. The RSA Cryptography Processor , 1987, EUROCRYPT.
[24] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[25] Joan V. Robinson. Economics of imperfect competition , 1969 .