Author:
Boudguiga Aymen,Klaudel Witold,Wesolowski Jimmy Durand
Reference21 articles.
1. R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov. Cryptographic processors-a survey.Proceedings of the IEEE, 94(2), Feb 2006.
2. Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, and Guy Gogniat. Architectures of flexible symmetric key crypto engines---a survey: From hardware coprocessor to multi-crypto-processor system on chip.ACM Comput. Surv., 45(4), August 2013.
3. Charette Robert. This car runs on code: http://spectrum.ieee.org/transportation/systems/this-car-runs-on-code, 2009.
4. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage. Experimental security analysis of a modern automobile. InProceedings of the 2010 IEEE Symposium on Security and Privacy.
5. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. Comprehensive experimental analyses of automotive attack surfaces. InProceedings of the 20th USENIX Conference on Security.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Data-Centric Accelerator Design Based on Processing in Memory;Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control;2019-09-25