Filters








30 Hits in 9.7 sec

Attacks and Defenses in Short-Range Wireless Technologies for IoT

Karim Lounis, Mohammad Zulkernine
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
It connects billions of heterogeneous devices, called Things, using different communication technologies and provides end-users, all over the world, with a variety of smart applications.  ...  Namely, we consider Wi-Fi, Bluetooth, ZigBee, and RFID wireless communication technologies.  ...  These techniques include masking [224] , cross-copying [225] , conditional assignment [226] , bucketing [227] , and predictive timing mitigation [228] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2993553">doi:10.1109/access.2020.2993553</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jtcl7llvy5crjaktwmvchlmcxa">fatcat:jtcl7llvy5crjaktwmvchlmcxa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108141339/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09090905.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e3/43/e343837050fc1cf6273b8716e08e1b72d4c2409f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2993553"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Linear Cryptanalysis for Block Ciphers [chapter]

Johannes Gehrke, Daniel Kifer, Ashwin Machanavajjhala, Arjen K. Lenstra, Phong Nguyen, Phong Nguyen, Daniele Micciancio, Scott Contini, Sabrina De Capitani diVimercati, Burt Kaliski, Stephen M Papa, William D. Casper (+13 others)
<span title="">2011</span> <i title="Springer US"> Encyclopedia of Cryptography and Security </i> &nbsp;
Definition ℓ-diversity is a method for publishing data about individuals while limiting the amount of sensitive information disclosed about them.  ...  Ajtai M () Generating hard instances of lattice problems (extended abstract).  ...  Section "Comparison with differential cryptanalysis" points out analogies between linear and differential cryptanalysis, and Section "Extensions" concludes with some extended variants of linear cryptanalysis  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-5906-5_589">doi:10.1007/978-1-4419-5906-5_589</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zn4blza5ezggzhayzeuxeix5oa">fatcat:zn4blza5ezggzhayzeuxeix5oa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160923011314/http://orbilu.uni.lu/bitstream/10993/17077/1/linear-cryptanalysis.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/07/93/0793347f5d3496179aeb871b32c17936a4fd6252.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4419-5906-5_589"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis [article]

Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache
<span title="2021-09-28">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high-frequency CPUs and complex pipelines.  ...  Both advancements have dramatically complicated the use of conventional physical attacks, requiring the development of specialised attacks.  ...  The authors would like to thank the EXFILES WP5 project partners for comments and discussions around the topic of this work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.04454v5">arXiv:2105.04454v5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/27ldfag7ejgvxh7cbs2qnevb24">fatcat:27ldfag7ejgvxh7cbs2qnevb24</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210812043954/https://arxiv.org/pdf/2105.04454v4.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b8/25/b8256a244c651deaef7662754ae10e7a4bc461f0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.04454v5" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Appendix [chapter]

<span title="2010-05-17">2010</span> <i title="John Wiley &amp; Sons, Ltd"> Smart Card Handbook </i> &nbsp;
Access conditions (AC) In connection with a smart card file system, the access conditions of a file are a finite number of conditions that govern access to the file concerned via the operating system for  ...  Magnetic-stripe cards are often issued to these individuals, with data stored on these cards granting access to specific groups of entry points at specific times.  ...  Lead time In semiconductor fabrication, the elapsed time between the provision of the mask (→ ROM mask) and the availability of the first samples.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9780470660911.app1">doi:10.1002/9780470660911.app1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qy7ioz5aofhg7pem45tp42tulu">fatcat:qy7ioz5aofhg7pem45tp42tulu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191128115440/https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/9780470660911.app1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6b/62/6b62c1f16f8e61bc45841d48de84c04c724ef997.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9780470660911.app1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Associate Editors-in-Chief

<span title="">2014</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/aggjmlgiyfctbhcooncg7otkc4" style="color: black;">Acta Geologica Sinica (English)</a> </i> &nbsp;
The secret message was encrypted and embedded with different algorithms before sending audio packets to meet the real-time requirements of VoIP communications.  ...  Section 2 introduces our proposed real-time covert VoIP communication system with an underlying steganographic algorithm consisting of key distribution, encryption, embedding, and extraction.  ...  Submission of a manuscript implies: that the work described has not been published before (except in the form of an abstract or as part of a published lecture, review, or thesis); that it is not under  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1111/1755-6724.12260">doi:10.1111/1755-6724.12260</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ffjz4kvnqnavzeipqzyladsyyu">fatcat:ffjz4kvnqnavzeipqzyladsyyu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923002325/http://www.china-iot.net/sciFe_2014_3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a8/9b/a89b417daee489771a5023ba0e8980b5529cdba4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1111/1755-6724.12260"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Associate Editors-in-Chief [chapter]

<span title="">2012</span> <i title="Elsevier"> International Encyclopedia of Housing and Home </i> &nbsp;
The secret message was encrypted and embedded with different algorithms before sending audio packets to meet the real-time requirements of VoIP communications.  ...  Section 2 introduces our proposed real-time covert VoIP communication system with an underlying steganographic algorithm consisting of key distribution, encryption, embedding, and extraction.  ...  Submission of a manuscript implies: that the work described has not been published before (except in the form of an abstract or as part of a published lecture, review, or thesis); that it is not under  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/b978-0-08-047163-1.09002-0">doi:10.1016/b978-0-08-047163-1.09002-0</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t3rt56yjb5bwfnn5ttrcx3g2dy">fatcat:t3rt56yjb5bwfnn5ttrcx3g2dy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923002325/http://www.china-iot.net/sciFe_2014_3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a8/9b/a89b417daee489771a5023ba0e8980b5529cdba4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/b978-0-08-047163-1.09002-0"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
<span title="2012-02-01">2012</span> <i title="Academy Publisher"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/drz46fz5hfbfnerxeguotm7kmy" style="color: black;">Journal of Networks</a> </i> &nbsp;
A Review on Cloud Computing Development Sugang Ma 222 229 236 243 249 259 267 275 282 288 300 305 REGULAR PAPERS Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model and Security  ...  Through such combination, the advantages of AP in time costs and the advantages of NC in accuracy have been adopted.  ...  Therefore, it is hard to block attacks in real time.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4304/jnw.7.2.275-281">doi:10.4304/jnw.7.2.275-281</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3ejjimllcvewjeifopbvhl3zmi">fatcat:3ejjimllcvewjeifopbvhl3zmi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171117114839/https://core.ac.uk/download/pdf/25792833.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4304/jnw.7.2.275-281"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions

Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, Bhargav Appasani, Avireni Srinivasulu, Nicu Bizon
<span title="">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/oglosmy3gbhuzobyjit4qalakq" style="color: black;">Sustainability</a> </i> &nbsp;
It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network.  ...  With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/su13169463">doi:10.3390/su13169463</a> <a target="_blank" rel="external noopener" href="https://doaj.org/article/44db3364484545048c70058a0a459fd4">doaj:44db3364484545048c70058a0a459fd4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f5ruitiqprhxlfnx4iiwcf67ju">fatcat:f5ruitiqprhxlfnx4iiwcf67ju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220321211315/https://mdpi-res.com/d_attachment/sustainability/sustainability-13-09463/article_deploy/sustainability-13-09463-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/e9/62e936c8df13df8bc8a5fe28b4622d5d690778b5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/su13169463"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities

Showkat Ahmad Bhat, Ishfaq Bashir Sofi, Chong-Yung Chi
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
accidents or remote monitoring of patients [106] with serious conditions or others.  ...  QoS is aware of application deployment. Edge analytics for real-time stream data processing. Security and privacy Encryption-based data protection. Selective information sharing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3037108">doi:10.1109/access.2020.3037108</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iksoyfx7nbhfrefnzgf6uxuw4q">fatcat:iksoyfx7nbhfrefnzgf6uxuw4q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201116041748/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09253517.pdf?tp=&amp;arnumber=9253517&amp;isnumber=6514899&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0c/62/0c62830ae6cd381d710509496e0b437cb77ee4e9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3037108"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Public-Key Infrastructure [chapter]

<span title="2013-03-25">2013</span> <i title="John Wiley &amp; Sons, Ltd"> Wireless Mobile Internet Security </i> &nbsp;
In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received.  ...  Preface This book contains the proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, which was held on the NTNU campus Gløshaugen in Trondheim, Norway,  ...  Stephen Kent of BBN, who developed the RPKI concept, and whose guidance was critical to the accomplishment of this project.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781118512920.ch7">doi:10.1002/9781118512920.ch7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hocfzfhi4rbuhmssop2hkwbc64">fatcat:hocfzfhi4rbuhmssop2hkwbc64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160919180742/http://orbilu.uni.lu/bitstream/10993/25909/1/bok%253A978-3-540-69485-4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/3d/5d3dc8a9addb140613cea039906ebe2fb17f8f57.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781118512920.ch7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Linear Cryptanalysis for Block Ciphers [chapter]

Alex Biryukov, Christophe Cannière
<i title="Springer US"> Encyclopedia of Cryptography and Security </i> &nbsp;
Ajtai M () Generating hard instances of lattice problems(extended abstract).  ...  ciphers with linear masking.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/0-387-23483-7_233">doi:10.1007/0-387-23483-7_233</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6dimyk7vc5cxpgsoebju47bwn4">fatcat:6dimyk7vc5cxpgsoebju47bwn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160923011314/http://orbilu.uni.lu/bitstream/10993/17077/1/linear-cryptanalysis.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/07/93/0793347f5d3496179aeb871b32c17936a4fd6252.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/0-387-23483-7_233"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Statistical cryptanalysis of block ciphers

Pascal Junod
<span title="2005-03-16">2005</span>
Matsui's linear cryptanalysis as well as more abstract models of attacks.  ...  Although FEAL with 32 rounds is secure against modern forms of cryptanalysis, no real credibility is given by its design against future cryptanalysis.  ...  ∀a ∈ X , Pr where N (a|x) is the number of times the symbol a occurs in the sequence x ∈ X n . We denote by P n the set of types with denominator n.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5075/epfl-thesis-3179">doi:10.5075/epfl-thesis-3179</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/agalhimuavguxinavuhwol6zmi">fatcat:agalhimuavguxinavuhwol6zmi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070221142039/http://lasecwww.epfl.ch:80/pub/lasec/doc/Jun04.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/33/40/33401b9b45a10b67dff92cf518014a6d32e10502.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5075/epfl-thesis-3179"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Quantitative security of block ciphers:designs and cryptanalysis tools

Thomas Baignères
<span title="2008-08-28">2008</span>
The time complexity unit is a SAFER encryption.  ...  Given the timings we obtained, it appears that using C for encryption purpose is practical, in particular with the shortened key schedule.  ...  An element of P q is a vector with |Z| components, each of which can take at most q + 1 values. Theorem 1.1 Let Z be a finite set.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5075/epfl-thesis-4208">doi:10.5075/epfl-thesis-4208</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fgixncogbzdd3k47iz3fupwq2a">fatcat:fgixncogbzdd3k47iz3fupwq2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190307125711/https://infoscience.epfl.ch/record/126133/files/EPFL_TH4208.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c3/f8/c3f81c26923c0c88fff6d370c96ea888807e5f37.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5075/epfl-thesis-4208"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Frontmatter [chapter]

Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen
<span title="2019-08-05">2019</span> <i title="De Gruyter"> The Internet of Everything </i> &nbsp;
In real-time application development, the data flows from sensor devices to middleware using edge technologies like Wi-Fi and Bluetooth.  ...  Chen et al. [] Providing remote adjustment service and real time monitoring of PD patients with DBS.  ...  The related work gives an overview of medical sensor-based different application such as various real-time e-healthcare application, remote monitoring of the patients, doctor-patient relationship management  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/9783110628517-fm">doi:10.1515/9783110628517-fm</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3npfgq3o65f5pdbphf6pi4qn3a">fatcat:3npfgq3o65f5pdbphf6pi4qn3a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108231918/https://www.degruyter.com/downloadpdf/title/542977.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/40/11/4011d3b0a3520c21272b5acf2199322da74d4fee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/9783110628517-fm"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> degruyter.com </button> </a>

Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures

Tobias Hoppe, Stefan Kiltz, Jana Dittmann
<span title="">2011</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rzixovqh2vd4vaspoqcbcb77hq" style="color: black;">Reliability Engineering &amp; System Safety</a> </i> &nbsp;
With respect to the results of these tests, in this article we further discuss two selected countermeasures to address basic weaknesses exploited in our tests.  ...  With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests performed on the control systems for the window lift, warning light and airbag  ...  While some aspects of these tests have been described in more detail in previous publications, some of them have been slightly extended as a new contribution for this publication, also extended with a  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ress.2010.06.026">doi:10.1016/j.ress.2010.06.026</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ix4kgjy24fdl7gkuc7mqu7ifiq">fatcat:ix4kgjy24fdl7gkuc7mqu7ifiq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160418002803/http://www.cs.odu.edu:80/~nadeem/classes/cs795-CPS-S13/papers/sec-004.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/bb/cdbb46785f9b9acf8d03f3f8aba58b201f06639f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ress.2010.06.026"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 30 results