All Stories

  1. Automotive Security Testing—The Digital Crash Test
  2. A Survey of Security and Privacy in Connected Vehicles
  3. Information Technology Security Threats to Modern e-Enabled Aircraft: A Cautionary Note
  4. IT-Sicherheit in der Elektromobilität
  5. Sichere Botschaften – Moderne Kryptographie zum Schutz von Steuergeräten
  6. Cloud-Computing: Sicherheit an Bord?
  7. Automotive Embedded Systems Applications and Platform Embedded Security Requirements
  8. Secure Key Management - A Key Feature for Modern Vehicle Electronics
  9. Sichere Botschaften
  10. IT-Sicherheit in der Elektromobilität
  11. Trust assurance levels of cybercars in v2x communication
  12. Security Challenges in Automotive Hardware/Software Architecture Design
  13. IT-SICHERHEIT IN DER ELEKTROMOBILITÄT
  14. Automotive functional safety = safety + security
  15. Design, Implementation, and Evaluation of a Vehicular Hardware Security Module
  16. Implementing Data Security and Privacy in Next-Generation Electric Vehicle Systems
  17. Introduction to Vehicular Embedded Security
  18. Secure Feature Activation
  19. Security Engineering for Vehicular IT Systems
  20. Secure offline superdistribution for mobile platforms
  21. Security Analysis and Characteristical Constraints in the Automotive Domain
  22. Brief Background in Security and Cryptography
  23. Attackers and Attacks in the Automotive Domain
  24. Security-Critical Vehicular Applications
  25. Vehicular Security Technologies
  26. Introduction
  27. Organizational Security
  28. Vehicular Security Mechanisms
  29. Related Work
  30. Establishing Chain of Trust in Reconfigurable Hardware
  31. State of the Art: Embedding Security in Vehicles
  32. State of the Art: Embedding Security in Vehicles
  33. Reconfigurable trusted computing in hardware
  34. Embedded Security in Cars
  35. Secure In-Vehicle Communication
  36. Trusted Computing für automobile IT-Systeme
  37. Automotive Digital Rights Management Systems
  38. Securing Peer-to-Peer Distributions for Mobile Devices
  39. Enabling Fairer Digital Rights Management with Trusted Computing