{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:00:59Z","timestamp":1760079659765,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357541"},{"type":"electronic","value":"9783642357558"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35755-8_23","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T11:36:02Z","timestamp":1354188962000},"page":"330-344","source":"Crossref","is-referenced-by-count":6,"title":["Broadcast Authentication in a Low Speed Controller Area Network"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Pal-Stefan","family":"Murvay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"ISO: CAN Specification Version 2.0. Robert BOSCH GmbH (1991)"},{"key":"23_CR2","unstructured":"ISO: ISO 11898-1. Road vehicles - Controller area network (CAN) - Part 1: Controller area network data link layer and medium access control. International Organization for Standardization (2003)"},{"key":"23_CR3","unstructured":"Charzinski, J.: Performance of the error detection mechanisms in can. In: Proceedings of the 1st International CAN Conference, pp. 20\u201329 (1994)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Lemke, K., Paar, C., Wolf, M.: Embedded Security in Cars Securing Current and Future Automotive IT Applications. Springer (2006)","DOI":"10.1007\/3-540-28428-1"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: IEEE Symposium on Security and Privacy (SP), pp. 447\u2013462 (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"23_CR6","unstructured":"ISO: ISO 11898-4. Road vehicles - Controller area network (CAN) - Part 4: Time triggered communication. International Organization for Standardization (2004)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), pp. 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"23_CR8","unstructured":"Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, pp. 263\u2013276 (2003)"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1145\/1027794.1027800","volume":"3","author":"D. Liu","year":"2004","unstructured":"Liu, D., Ning, P.: Multilevel \u03bctesla: Broadcast authentication for distributed sensor networks. ACM Trans. Embed. Comput. Syst.\u00a03, 800\u2013836 (2004)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J., Song, D.X.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"23_CR11","unstructured":"Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. Network and Distributed System Security Symposium, NDSS 2001, 35\u201346 (2001)"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM\u00a024, 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/S0167-4048(02)00813-1","volume":"21","author":"F. Bergadano","year":"2002","unstructured":"Bergadano, F., Cavagnino, D., Crispo, B.: Individual authentication in multiparty communications. Computers & Security\u00a021, 719\u2013735 (2002)","journal-title":"Computers & Security"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/302350.302353","volume":"32","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Bergadano, F., Crispo, B., Lee, J.H., Manifavas, C., Needham, R.: A new family of authentication protocols. SIGOPS Oper. Syst. Rev.\u00a032, 9\u201320 (1998)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"23_CR15","unstructured":"Freescale: MC9S12XDP512 Data Sheet, Rev. 2.21 (October 2009)"},{"key":"23_CR16","unstructured":"Mitchell, R.: Tutorial: Introducing the XGATE Module to Consumer and Industrial Application Developers, Freescale (March 2004)"}],"container-title":["Communications in Computer and Information Science","E-Business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35755-8_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T23:09:16Z","timestamp":1745363356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35755-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642357541","9783642357558"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35755-8_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}