找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Embedded Security in Cars; Securing Current and Kerstin Lemke,Christof Paar,Marko Wolf Book 2006 Springer-Verlag Berlin Heidelberg 2006 Aut

[复制链接]
查看: 52304|回复: 59
发表于 2025-3-21 17:00:26 | 显示全部楼层 |阅读模式
书目名称Embedded Security in Cars
副标题Securing Current and
编辑Kerstin Lemke,Christof Paar,Marko Wolf
视频video
概述The first book ever dealing with the emerging area of IT security in automotive applications.Provides an accessible introduction on state-of-the-art security technologies for cars without mathematical
图书封面Titlebook: Embedded Security in Cars; Securing Current and Kerstin Lemke,Christof Paar,Marko Wolf Book 2006 Springer-Verlag Berlin Heidelberg 2006 Aut
描述.Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive IT systems against manipulation or intrusion has only recently started to emerge....Lemke, Paar, and Wolf collect in this volume a state-of-the-art overview on all aspects relevant for IT security in automotive applications. After an introductory chapter written by the editors themselves, the contributions from experienced experts of different disciplines are structured into three parts. "Security in the Automotive Domain" describes applications for which IT security is crucial, like immobilizers, tachographs, and software updates. "Embedded Security Technologies" details security technologies relevant for automotive applications, e.g., symmetric and asymmetric cryptography, and wireless security. "Business Aspects of IT Systems in Cars" shows the need for embedded security in novel applications like location-based navigation systems and
出版日期Book 2006
关键词Automotive Applications; Embedded Security; IT security; Navigational Systems; Secure Software Updates; T
版次1
doihttps://doi.org/10.1007/3-540-28428-1
isbn_softcover978-3-642-06659-7
isbn_ebook978-3-540-28428-4
copyrightSpringer-Verlag Berlin Heidelberg 2006
The information of publication is updating

书目名称Embedded Security in Cars影响因子(影响力)




书目名称Embedded Security in Cars影响因子(影响力)学科排名




书目名称Embedded Security in Cars网络公开度




书目名称Embedded Security in Cars网络公开度学科排名




书目名称Embedded Security in Cars被引频次




书目名称Embedded Security in Cars被引频次学科排名




书目名称Embedded Security in Cars年度引用




书目名称Embedded Security in Cars年度引用学科排名




书目名称Embedded Security in Cars读者反馈




书目名称Embedded Security in Cars读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:34:40 | 显示全部楼层
发表于 2025-3-22 01:35:26 | 显示全部楼层
Anti-theft Protection: Electronic Immobilizers information on the current solutions in the public domain, and the annual number of stolen cars still causes a significant loss. This generates other costs particularly regarding the increased insurance fees each individual has to pay..In this paper we present a system model that captures a variety
发表于 2025-3-22 05:12:51 | 显示全部楼层
发表于 2025-3-22 12:41:25 | 显示全部楼层
Secure In-Vehicle Communication of the most well-known and established vehicular communication systems, we present feasible attacks and potential exposures for these automotive networks. We also provide an approach for secured automotive communication based on modern cryptographic mechanisms that provide secrecy, manipulation pre
发表于 2025-3-22 13:51:27 | 显示全部楼层
发表于 2025-3-22 17:13:31 | 显示全部楼层
Fundamentals of Symmetric Cryptographyctronic data are exchanged. Cryptology is the main tool to realize data security. Cryptographic primitives will not only secure the data communication, but will provide safety and reliability of the given system. The latter is sometimes far more important for certain applications which involve autom
发表于 2025-3-22 22:12:40 | 显示全部楼层
发表于 2025-3-23 04:40:33 | 显示全部楼层
Embedded Cryptography: Side Channel Attacksfic literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability. In particular, we examine simple power analysis (SPA), differential power analysis (DPA), internal collision attacks and template attacks. Moreover, we give a brief
发表于 2025-3-23 07:36:02 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-30 00:35
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表