{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:48:27Z","timestamp":1725472107167},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/asicon.2015.7517021","type":"proceedings-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T16:38:31Z","timestamp":1469551111000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Challenges and future trends for embedded security in electric vehicular communications"],"prefix":"10.1109","author":[{"given":"Yi","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiqian","family":"Hong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaobo","family":"Luo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yajun","family":"Ha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"year":"0","key":"ref11","article-title":"IEEE Standard for Wireless Access in Vehicular Environments (WAVE)? Security Services for Applications and Management Messages"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.102"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29667-3_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747920"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2012.6239982"},{"key":"ref17","first-page":"58","article-title":"Electric Vehicle Charging Infrastructure Security Considerations and Approaches","author":"falk","year":"2012","journal-title":"Proc of INTERNET"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497830"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4271\/2010-01-0743"},{"key":"ref28","article-title":"Gateway framework for in-Vehicle networks based on CAN, FlexRay and Ethernet","author":"kim","year":"2014","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"ref4","article-title":"Security in automotive bus systems","author":"wolf","year":"2004","journal-title":"Workshop on Embedded Security in Cars"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19137-4_22"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"ref5","article-title":"CANAuth &#x2014; a simple, backward compatible broadcast authentication protocol for CAN bus","author":"van herrewege","year":"2011","journal-title":"Workshop on Embedded Security in Cars"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2013.6691106"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0174"},{"journal-title":"CAN with Flexible Data-Rate White Paper","year":"2011","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"journal-title":"CAN Specification","year":"1991","key":"ref1"},{"journal-title":"CAESAR Competition for Authenticated Encryption Security Applicability and Robustness","year":"0","key":"ref20"},{"article-title":"Security Engineering for Vehicular IT Systems Improving the Trustworthiness and Dependability of Automotive IT Applications","year":"2009","author":"wolf","key":"ref22"},{"year":"0","key":"ref21","article-title":"Security for plug-in electric vehicle communication"},{"key":"ref24","first-page":"302","article-title":"Design, implementation, and Evaluation of a vehicular hardware security module","author":"wolf","year":"2011","journal-title":"Information Security and Cryptography &#x2014; ICISC 2011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2014.6945510"},{"article-title":"Implementing Data Security and Privacy in Next-Generation Electric Vehicle Systems","year":"0","author":"paar","key":"ref25"}],"event":{"name":"2015 IEEE 11th International Conference on ASIC (ASICON )","start":{"date-parts":[[2015,11,3]]},"location":"Chengdu, China","end":{"date-parts":[[2015,11,6]]}},"container-title":["2015 IEEE 11th International Conference on ASIC (ASICON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7506193\/7516874\/07517021.pdf?arnumber=7517021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T12:40:39Z","timestamp":1489754439000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7517021\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/asicon.2015.7517021","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}