1. K. Bao H. Valev M. Wagner and H. Schmeck. 2017. A threat analysis of the vehicle-to-grid charging protocol ISO 15118. Computer Science - Research and Development (01 Sep 2017). K. Bao H. Valev M. Wagner and H. Schmeck. 2017. A threat analysis of the vehicle-to-grid charging protocol ISO 15118. Computer Science - Research and Development (01 Sep 2017).
2. Recommendation for Key Management Part 1: General
3. Protection Profile V2X Hardware Security Module;CAR 2 CAR Communication Consortium;Release,2018
4. D. Challener and W. Arthur. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress. D. Challener and W. Arthur. 2015. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security . Apress.