[1] CHAUDHRY H, BOHN T. Security Concerns of a Plug-in Vehicle [C]//Proceedings of the 2012 IEEE PES Innovative Smart Grid Technologies. Piscataway: IEEE, 2012: 1-6.
[2] KLEBERGER P, OLOVSSON T. Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties [C]//Lecture Notes in Computer Science: 8153. Heidelberg: Springer Verlag, 2013: 70-81.
[3] KLEBERGER P, OLOVSSON T. Secure Vehicle Diagnostics in Repair Shops [C]//Lecture Notes in Computer Science: 8666. Heidelberg: Springer Verlag, 2014: 93-108.
[4] 焦政达, 马建峰, 孙聪, 等. 新的车辆远程诊断授权协议[J]. 通信学报, 2014, 35(11): 146-153.
JIAO Zhengda, MA Jianfeng, SUN Cong, et al. New Remote Authorization Protocol for Vehicle Diagnosis [J]. Journal on Communications, 2014, 35(11): 146-153.
[5] KARUMANCHI S, SQUICCIARINI A, LIN D. Privacy-aware Access Control for Message Exchange in Vehicular Ad Hoc Networks [J]. Telecommunication Systems, 2015, 58(4): 349-361.
[6] ZHAO T Y, ZHANG C, WEI L B, et al. A Secure and Privacy-preserving Payment System for Electric Vehicles [C]//Proceedings of the IEEE International Conference on Communications. Piscataway: IEEE, 2015: 7280-7285.
[7] CHANNEL A. Toyota Motor Corporation Joins Trusted Computing Group (TCG) [EB/OL]. [2016-05-25]. http://www.theautochannel.com/news/2012/03/15/029016-toyota-motor-corporation-joins-trusted-computing-group-tcg.html.
[8] TRUSTED COMPUTING GROUP. TCG Architecture Overview: Version 1.4 [S]. TCG, 2007.
[9] BLANCHET B. ProVerif: Cryptographic Protocol Verifier in the Formal Model [EB/OL]. [2016-05-25]. http://prosecco.gforge.inria.fr/personal/bblanche/proverif/.
[10] IEEE Standard for Information Technology-local and Metropolitan Area Networks—Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Wireless Access in Vehicular Environments: 802.11p-2010 [S]. IEEE, 2010.
[11] WOLF M, GENDRULLIS T. Design, Implementation, and Evaluation of a Vehicular Hardware Security Module [C]//Lecture Notes in Computer Science: 7259. Heidelberg: Springer Verlag, 2012: 302-318.
[12] LIU J Z, DONG J M. Design and Implementation of an Efficient RSA Crypto-processor [C]//Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing. Piscataway: IEEE, 2010: 368-372. |