1. War texting: identifying and interacting with devices on the telephone network;Bailey,2010
2. How to steal cars – a practical attack on keeloq;Biham,2010
3. Proverif: cryptographic protocol verifier in the formal model;Blanchet,2012
4. Automotive computer controlled systems, diagnostic tools and techniques;Bonnick,2001
5. Security analysis of a cryptographically-enabled rfid device;Bono,2007