{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T03:51:48Z","timestamp":1759117908334},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407925"},{"type":"electronic","value":"9783642407932"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40793-2_7","type":"book-chapter","created":{"date-parts":[[2013,8,26]],"date-time":"2013-08-26T22:10:59Z","timestamp":1377555059000},"page":"70-81","source":"Crossref","is-referenced-by-count":3,"title":["Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Kleberger","sequence":"first","affiliation":[]},{"given":"Tomas","family":"Olovsson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"7_CR1","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/MCOM.2011.5762813","volume":"49","author":"F. Dressler","year":"2011","unstructured":"Dressler, F., Kargl, F., Ott, J., Tonguz, O., Wischhof, L.: Research Challenges in Intervehicular Communication: Lessons of the 2010 Dagstuhl Seminar. IEEE Communications Magazine\u00a049(5), 158\u2013164 (2011)","journal-title":"IEEE Communications Magazine"},{"key":"7_CR2","first-page":"99","volume-title":"Proc. of the Seventh International Conference on Systems and Networks Communications (ICSNC 2012)","author":"P. Kleberger","year":"2012","unstructured":"Kleberger, P., Olovsson, T., Jonsson, E.: An In-Depth Analysis of the Security of the Connected Repair Shop. In: Proc. of the Seventh International Conference on Systems and Networks Communications (ICSNC 2012), November\u00a018-23, pp. 99\u2013107. IARIA, Lisbon (2012)"},{"key":"7_CR3","unstructured":"Kelling, E., Friedewald, M., Leimbach, T., Menzel, M., S\u00e4ger, P., Seudi\u00e9, H., Weyl, B.: Specification and evaluation of e-security relevant use cases. EVITA Project, Deliverable D2.1, v1.2. (December\u00a030, 2009)"},{"key":"7_CR4","unstructured":"ETSI: Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Definitions. Technical Report TR 102 638, v1.1.1, ETSI, 650 Route des Lucioles, F-06921 Sophia Antipolis Cedex, France (June 2009)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-19786-4_20","volume-title":"Communication Technologies for Vehicles","author":"M.S. Idrees","year":"2011","unstructured":"Idrees, M.S., Schweppe, H., Roudier, Y., Wolf, M., Scheuermann, D., Henniger, O.: Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates. In: Strang, T., Festag, A., Vinel, A., Mehmood, R., Rico Garcia, C., R\u00f6ckl, M. (eds.) Nets4Trains\/Nets4Cars 2011. LNCS, vol.\u00a06596, pp. 224\u2013238. Springer, Heidelberg (2011)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Mahmud, S.M., Shanker, S., Hossain, I.: Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links. In: Proc. of the IEEE Intelligent Vehicles Symposium, pp. 588\u2013593 (2005)","DOI":"10.1109\/IVS.2005.1505167"},{"key":"7_CR7","unstructured":"Hossain, I., Mahmud, S.M.: Secure Multicast Protocol for Remote Software Upload in Intelligent Vehicles. In: Proc. of the 5th Ann. Intel. Vehicle Systems Symp. of National Defense Industries Association (NDIA), Traverse City, MI, National Automotive Center and Vectronics Technology, June\u00a013-16, pp. 145\u2013155 (2005)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E.: Secure Firmware Updates over the Air in Intelligent Vehicles. In: Proc. IEEE International Conference on Communications Workshops (ICC Workshops)., May\u00a019-23, pp. 380\u2013384 (2008)","DOI":"10.1109\/ICCW.2008.78"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-87698-4_19","volume-title":"Computer Safety, Reliability, and Security","author":"D.K. Nilsson","year":"2008","unstructured":"Nilsson, D.K., Larson, U.E., Jonsson, E.: Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol.\u00a05219, pp. 207\u2013220. Springer, Heidelberg (2008)"},{"key":"7_CR10","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/0-387-33406-8_6","volume-title":"Security and Privacy in Dynamic Environments","author":"H. Moustafa","year":"2006","unstructured":"Moustafa, H., Bourdon, G., Gourhant, Y.: Providing Authentication and Access Control in Vehicular Network Environment. In: Fischer-H\u00fcbner, S., Rannenberg, K., Yngstr\u00f6m, L., Lindskog, S. (eds.) Security and Privacy in Dynamic Environments. IFIP, vol.\u00a0201, pp. 62\u201373. Springer, Boston (2006)"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1504\/IJAACS.2010.031088","volume":"3","author":"E. Coronado","year":"2010","unstructured":"Coronado, E., Cherkaoui, S.: A secure service architecture to support wireless vehicular networks. International Journal of Autonomous and Adaptive Communications Systems\u00a03(2), 136\u2013158 (2010)","journal-title":"International Journal of Autonomous and Adaptive Communications Systems"},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1504\/IJAACS.2010.031087","volume":"3","author":"V. Casola","year":"2010","unstructured":"Casola, V., Luna, J., Mazzeo, A., Medina, M., Rak, M., Serna, J.: An interoperability system for authentication and authorisation in VANETs. International Journal of Autonomous and Adaptive Communications Systems\u00a03(2), 115\u2013135 (2010)","journal-title":"International Journal of Autonomous and Adaptive Communications Systems"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Rigney, C., Willens, S., Rubens, A., Simpson, W.: RFC 2865: Remote Authentication Dial In User Service (RADIUS) (June 2000)","DOI":"10.17487\/rfc2865"},{"key":"7_CR14","unstructured":"Steiner, J., Neuman, C., Schiller, J.: Kerberos: An authentication service for open network systems. In: Usenix Conference Proceedings, vol.\u00a0191, p. 202 (1988)"},{"key":"7_CR15","unstructured":"Hill, J.: An Analysis of the RADIUS Authentication Protocol (November\u00a024, 2001), \n                    \n                      http:\/\/www.untruth.org\/~josh\/security\/radius\/radius-auth.html\n                    \n                    \n                  . (verified June 6, 2013)"},{"key":"7_CR16","unstructured":"Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents. (Sandia Report: SAND98-8667) (1998)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40793-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T19:18:17Z","timestamp":1558034297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40793-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407925","9783642407932"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40793-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}