{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:36:52Z","timestamp":1760132212741,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/indin.2012.6301060","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T16:46:11Z","timestamp":1347900371000},"page":"821-826","source":"Crossref","is-referenced-by-count":5,"title":["Copy protection for automotive electronic control units using authenticity heartbeat signals"],"prefix":"10.1109","author":[{"given":"Armin","family":"Wasicek","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Motortuning Zur Leistungssteigerung An Traktoren","year":"2006","author":"prankl","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"15","first-page":"83","article-title":"DECOS: An Integrated Time-Triggered Architecture","volume":"3","author":"obermaisser","year":"2006","journal-title":"e&i journal (journal of the Austrian professional institution for electrical and information engineering)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689252"},{"journal-title":"Why Ford Just Became A Software Company Online","year":"2011","author":"murphy","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2071388"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.110"},{"key":"12","article-title":"Estimating the new automotive value chain","author":"mcalinden","year":"2002","journal-title":"Study CAR\/ALTARUM 2002-07"},{"journal-title":"E\/E Diagnostic Test Modes","year":"2010","key":"21"},{"key":"20","article-title":"Informatisierung in der Automobilindustrie","author":"roth","year":"2005","journal-title":"Informatisierung der Arbeit Gesellschaft Im Umbruch"},{"journal-title":"Copy Protection in Modern Microcontrollers Online","year":"2001","author":"skorobogatov","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270342"},{"key":"24","article-title":"RFID-tags for Anti-Counterfeiting","volume":"3860","author":"tuyls","year":"2006","journal-title":"LNCS"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364671"},{"journal-title":"Strategien in der Automobilindustrie Technologietrends und Marktentwicklungen","year":"2009","author":"wallentowitz","key":"26"},{"key":"27","article-title":"End-to-End Encryption in the TTSoC Architecture","author":"wasicek","year":"2008","journal-title":"Proceedings of the 3rd Workshop on Embedded Systems Security ESWEEK'08 Atlanta USA"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2011.14"},{"key":"29","article-title":"Design, implementation, and evaluation of a vehicular hardware security module","author":"wolf","year":"0","journal-title":"14th International Conference on Information Security and Cryptology 2011"},{"key":"3","article-title":"Intra-Vehicle Information Security Framework","author":"bar-el","year":"0","journal-title":"Conference on Embedded Systems in Cars (ESCAR) 2009"},{"journal-title":"Anomaly Detection A Survey","year":"2009","author":"banerjee","key":"2"},{"key":"10","first-page":"753","article-title":"Security as a new dimension in embedded system design","author":"kocher","year":"2004","journal-title":"Proceedings 41st Design Automation Conference 2004 DAC"},{"journal-title":"Security requirements for cryptographic modules","year":"2002","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9581-3"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.424560"},{"journal-title":"Automotive after Sales 2015 Are You Ready for the Battle?","year":"2008","author":"gissler","key":"6"},{"key":"5","article-title":"Security architecture for vehicular communication","author":"gerlach","year":"0","journal-title":"4th International Workshop on Intelligent Transportation (WIT) 2007"},{"journal-title":"2010 Global Piracy Study","year":"2011","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2012.6356590"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"}],"event":{"name":"2012 10th IEEE International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2012,7,25]]},"location":"Beijing, China","end":{"date-parts":[[2012,7,27]]}},"container-title":["IEEE 10th International Conference on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6294017\/6300337\/06301060.pdf?arnumber=6301060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:02:46Z","timestamp":1490126566000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6301060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/indin.2012.6301060","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}