{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:10:49Z","timestamp":1775837449143,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/tii.2013.2239301","type":"journal-article","created":{"date-parts":[[2013,10,16]],"date-time":"2013-10-16T18:03:28Z","timestamp":1381946608000},"page":"2034-2042","source":"Crossref","is-referenced-by-count":105,"title":["Efficient Protocols for Secure Broadcast in Controller Area Networks"],"prefix":"10.1109","volume":"9","author":[{"given":"Bogdan","family":"Groza","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Murvay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","year":"2011","journal-title":"ECRYPT II Yearly Rep on Algorithms and Keysizes (2009?2010) Revision 1 0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.012"},{"key":"ref11","first-page":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proc 20th USENIX Conf on Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2099233"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"ref14","author":"falliere","year":"2011","journal-title":"W32 stuxnet Dossier"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2036033"},{"key":"ref16","first-page":"72","article-title":"Higher layer authentication for broadcast in controller area networks","author":"groza","year":"2011","journal-title":"Proc Int Conf Security Cryptography (SECRYPT)"},{"key":"ref17","author":"hartenstein","year":"2009","journal-title":"VANET Vehicular Applications and Inter-Networking Technologies"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref28","first-page":"189","article-title":"Spins: Security protocols for sensor networks","author":"perrig","year":"2001","journal-title":"Proc 7th Ann ACM Int Conf Mobile Computing Networks (MobiCom 2001)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2036642"},{"key":"ref27","first-page":"35","article-title":"Efficient and secure source authentication for multicast","author":"perrig","year":"2001","journal-title":"Proc Network Distributed System Security Symp NDSS '01"},{"key":"ref3","article-title":"Intra-vehicle information security framework","author":"bar-el","year":"2009","journal-title":"Proc 9th Embedded Security in Cars Conf ESCAR"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2052927"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2006.875505"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/41.605633"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00813-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/41.857976"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2002.804967"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28428-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"ref21","first-page":"263","article-title":"Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks","author":"liu","year":"2003","journal-title":"Proc 10th Ann Netw Distributed System Security Symp"},{"key":"ref24","first-page":"369","article-title":"A digital signature based on a conventional encryption function","author":"merkle","year":"1988","journal-title":"Proc Conf Theory Appl Cryptographic Techniques on Advances in Cryptology CRYPTO '87 Springer-Verlag"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2072961"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2077614"},{"key":"ref25","author":"mitchell","year":"2004","journal-title":"?Tutorial Introducing the XGATE Module to Consumer and Industrial Application Developers ?"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9424\/6631519\/06409452.pdf?arnumber=6409452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:45:43Z","timestamp":1638218743000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6409452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tii.2013.2239301","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11]]}}}