{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:57:36Z","timestamp":1766066256059},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/date.2012.6176633","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T13:16:29Z","timestamp":1361279789000},"page":"947-952","source":"Crossref","is-referenced-by-count":15,"title":["Co-design techniques for distributed real-time embedded systems with communication security constraints"],"prefix":"10.1109","author":[{"family":"Ke Jiang","sequence":"first","affiliation":[]},{"given":"P.","family":"Eles","sequence":"additional","affiliation":[]},{"family":"Zebo Peng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/92.894152"},{"journal-title":"Constraint Logic Programming using Eclipse","year":"2006","key":"18"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2002","key":"15"},{"journal-title":"Xilinx","year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/92.931230"},{"key":"14","first-page":"125","article-title":"A comparative study of performance of aes final candidates using fpgas","author":"dandalis","year":"2000","journal-title":"CHES 2000"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1193231"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1878961.1878970"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"journal-title":"FlexRay","year":"0","key":"2"},{"journal-title":"CAN in Automation (CiA)","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2011.5783087"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1_6"},{"key":"4","article-title":"Can a virus hitch a ride in your car?","author":"zellar","year":"2005","journal-title":"New York Times"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023881"},{"key":"8","article-title":"Challenges in Securing Vehicular Networks","author":"parno","year":"0","journal-title":"Proceedings of the Workshop on Hot Topics in Networks (HotNets-IV) 2005"}],"event":{"name":"2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)","start":{"date-parts":[[2012,3,12]]},"location":"Dresden","end":{"date-parts":[[2012,3,16]]}},"container-title":["2012 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6171057\/6176405\/06176633.pdf?arnumber=6176633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:00:16Z","timestamp":1490108416000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6176633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/date.2012.6176633","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}