Author of the publication

Security challenges in automotive hardware/software architecture design.

, , , , , , , , , and . DATE, page 458-463. EDA Consortium San Jose, CA, USA / ACM DL, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates., , , , , and . Nets4Cars/Nets4Trains, volume 6596 of Lecture Notes in Computer Science, page 224-238. Springer, (2011)Design, Implementation, and Evaluation of a Vehicular Hardware Security Module., and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 302-318. Springer, (2011)Reconfigurable trusted computing in hardware., , , , , and . STC, page 15-20. ACM, (2007)Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementation Aspects., and . Sicherheit, volume P-128 of LNI, page 485-498. GI, (2008)Hacking Trucks - Cybersecurity Risks and Effective Cybersecurity Protection for Heavy Duty Vehicles., and . Automotive - Safety & Security, volume P-269 of LNI, page 45-60. Gesellschaft für Informatik, Bonn, (2017)Information Technology Security Threats to Modern e-Enabled Aircraft: A Cautionary Note., , and . J. Aerospace Inf. Sys., 11 (7): 447-457 (2014)Secure offline superdistribution for mobile platforms., , and . IJACT, 1 (4): 251-263 (2009)State of the Art: Embedding Security in Vehicles., , and . EURASIP J. Emb. Sys., (2007)Enabling Fairer Digital Rights Management with Trusted Computing., , , , and . ISC, volume 4779 of Lecture Notes in Computer Science, page 53-70. Springer, (2007)Trust assurance levels of cybercars in v2x communication., , , , and . CyCAR@CCS, page 49-60. ACM, (2013)