Author of the publication

CarINA - Car Sharing with IdeNtity Based Access Control Re-enforced by TPM.

, , and . SAFECOMP Workshops, volume 11699 of Lecture Notes in Computer Science, page 210-222. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traffic models with adversarial vehicle behaviour.. CoRR, (2017)Security Analysis of Vehicle Instrument Clusters by Automatic Fuzzing and Image Acquisition., , , and . AQTR, page 1-6. IEEE, (2022)Impact of Wiring Characteristics on Voltage-based Fingerprinting in Controller Area Networks., , , , and . SACI, page 231-236. IEEE, (2023)A multidisciplinary project: How to turn a webcam into a secure-cam., and . SACI, page 381-386. IEEE, (2009)Securing the controller area network with covert voltage channels., , and . Int. J. Inf. Sec., 20 (6): 817-831 (2021)Source Identification Using Signal Characteristics in Controller Area Networks., and . IEEE Signal Process. Lett., 21 (4): 395-399 (2014)Android Head Units vs. In-Vehicle ECUs: Performance Assessment for Deploying In-Vehicle Intrusion Detection Systems for the CAN Bus., , , and . IEEE Access, (2022)CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals., , , , and . CoRR, (2021)Risk Assessment and Security Countermeasures for Vehicular Instrument Clusters., , and . DSN Workshops, page 223-230. IEEE Computer Society, (2018)Provable Synthetic Coordinates for Increasing PoWs Effectiveness against DoS and Spam., and . SocialCom/PASSAT, page 809-810. IEEE Computer Society, (2012)