{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:37:20Z","timestamp":1760132240316},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336744"},{"type":"electronic","value":"9783642336751"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33675-1_33","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T16:33:04Z","timestamp":1347294784000},"page":"365-372","source":"Crossref","is-referenced-by-count":3,"title":["Towards Secure Time-Triggered Systems"],"prefix":"10.1007","author":[{"given":"Florian","family":"Skopik","sequence":"first","affiliation":[]},{"given":"Albert","family":"Treytl","sequence":"additional","affiliation":[]},{"given":"Arjan","family":"Geven","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Hirschler","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Bleier","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Eckel","sequence":"additional","affiliation":[]},{"given":"Christian","family":"El-Salloum","sequence":"additional","affiliation":[]},{"given":"Armin","family":"Wasicek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Anderson, R.J.: Security engineering - a guide to building dependable distributed systems, 2nd edn. Wiley (2008)"},{"issue":"1","key":"33_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.E.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Sec. Comput.\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"33_CR3","unstructured":"Bar-El, H.: Intra-vehicle information security framework. Tech. rep., Discretix Technologies Ltd. (September 2009)"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Berwanger, J., Ebner, C., Schedl, A., Belschner, R., Fluhrer, S., et al.: FlexRay \u2013 The Communication System for Advanced Automotive Control Systems (2001)","DOI":"10.4271\/2001-01-0676"},{"key":"33_CR5","unstructured":"Cooney, M.: Nasa takes ethernet deeper into space (2009), \n                    \n                      http:\/\/www.networkworld.com\/community\/node\/40899"},{"key":"33_CR6","volume-title":"Real-Time Systems: Design Principles for Distributed Embedded Applications","author":"H. Kopetz","year":"1997","unstructured":"Kopetz, H.: Real-Time Systems: Design Principles for Distributed Embedded Applications, 1st edn. Kluwer Academic Publishers, Norwell (1997)","edition":"1"},{"issue":"1","key":"33_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/JPROC.2002.805821","volume":"91","author":"H. Kopetz","year":"2003","unstructured":"Kopetz, H., Bauer, G.: The time-triggered architecture. Proceedings of the IEEE\u00a091(1), 112\u2013126 (2003)","journal-title":"Proceedings of the IEEE"},{"issue":"5","key":"33_CR8","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: Security protocols for sensor networks. Wireless Networks\u00a08(5), 521\u2013534 (2002)","journal-title":"Wireless Networks"},{"key":"33_CR9","unstructured":"Rushby, J.: A comparison of bus architectures for safety-critical embedded systems. Research Report NASA\/CR-2003-212161, pp. 112\u2013126 (2003)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Schoitsch, E.: Design for safety and security of complex embedded systems: a unified approach. In: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, pp. 161\u2013174. Springer (2004)","DOI":"10.1007\/1-4020-3381-8_9"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Treytl, A., Gaderer, G., Hirschler, B., Cohen, R.: Traps and pitfalls in secure clock synchronization. In: ISPCS, pp. 18\u201324 (2007)","DOI":"10.1109\/ISPCS.2007.4383768"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Treytl, A., Hirschler, B.: Securing IEEE 1588 by ipsec tunnels - an analysis. In: ISPCS, pp. 83\u201390 (2010)","DOI":"10.1109\/ISPCS.2010.5609765"},{"key":"33_CR13","unstructured":"Wasicek, A.: Security in Time-Triggered Systems. Ph.D. thesis, Vienna University of Technology (2012)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Wasicek, A., Salloum, C.E., Kopetz, H.: Authentication in time-triggered systems using time-delayed release of keys. In: ISORC, pp. 31\u201339 (2011)","DOI":"10.1109\/ISORC.2011.14"},{"key":"33_CR15","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Embedded security in cars: Securing current and future automotive it applications (2006)"},{"issue":"10","key":"33_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A.D. Wood","year":"2002","unstructured":"Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer\u00a035(10), 54\u201362 (2002)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33675-1_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:18:29Z","timestamp":1620130709000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33675-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336744","9783642336751"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33675-1_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}