Securing Vehicles

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: Securing Appified Automated Vehicles With AVGUARD

The advancement in Autonomous Vehicle (AV) has created an enormous market for the development of selfdriving functionalities, and has raised the question of how it will transform the traditional vehicle development process. One adventurous proposal is to open the AV platform to 3rd party developers, so that AV functionalities can be developed in a crowdsourcing way, which is supposed to provide...

متن کامل

Securing Internet of Vehicles Using TCM

In order to solve the security issues of mobile vehicles in the Internet of vehicles, such as identity authentication and integrality verification, we apply the trusted cryptography module (TCM) into the on-vehicle electronic systems. TCM has many security features, such as integrality measurement, integrality report and protected storage, by which the on-vehicle electronic systems achieve a tr...

متن کامل

Securing Atm Networks Securing Atm Networks

This is an interim report on the investigations into securing Asynchronous Transfer Mode (ATM) networks. We look at the challenge in providing such a secure ATM network and identify the important issues in achieving such goal. In this paper, we discuss the issues and problems involved and outline some techniques to solving these problems. The network environment is rst examined and we also cons...

متن کامل

Securing Provenance

Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of these applications call for security, but existing security models are not up to the task. Provenance is a causality graph with annotations. The causality graph connects the various participating objects describing the...

متن کامل

Securing Distance-vector Routing Protocols Securing Distance-vector Routing Protocols

The security requirements of distance-vector routing protocols are analyzed, their vulnerabilities identi ed, and countermeasures to these vulnerabilities are proposed. The innovation presented involves the use of mechanisms from the pathnding class of distancevector protocols as a solution to the security problems of distance-vector protocols. The result is the rst proposal to e ectively and e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Auto Tech Review

سال: 2016

ISSN: 2250-3390

DOI: 10.1365/s40112-016-1112-0