{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:15:18Z","timestamp":1766733318905},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/vtcfall.2017.8288327","type":"proceedings-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T22:55:22Z","timestamp":1518476122000},"source":"Crossref","is-referenced-by-count":30,"title":["In-Vehicle CAN Message Authentication: An Evaluation Based on Industrial Criteria"],"prefix":"10.1109","author":[{"given":"Nasser","family":"Nowdehi","sequence":"first","affiliation":[]},{"given":"Aljoscha","family":"Lautenbach","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Olovsson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"ref11","article-title":"MaCAN-Message authenticated CAN","author":"hartkopp","year":"2012","journal-title":"ESC Conference"},{"key":"ref12","article-title":"CaCAN-Centralized authentication system in CAN (controller area network)","author":"kurachi","year":"2014","journal-title":"14th Int Conf on Embedded Security in Cars"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2014.7030108"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2351612"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_6"},{"key":"ref16","article-title":"Authentication method for CAN messages","author":"weisglass","year":"2016","journal-title":"escar Europe"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090826"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10181-1_15"},{"key":"ref19","article-title":"Entity authentication and key distribution","author":"bellare","year":"1993","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref4","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proceedings of the 20th USENIX Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2818362.2818369"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746267"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"ref7","article-title":"CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus","author":"van herrewege","year":"0","journal-title":"ECRYPT Workshop on Lightweight Cryptography 2011"},{"key":"ref2","year":"2015","journal-title":"Alert (ICS-ALERT-15&#x2013;203-01) FCA Uconnect Vulnerability"},{"key":"ref1","article-title":"Remote exploitation of an unaltered passenger vehicle","author":"miller","year":"0","journal-title":"Black Hat USA 2015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35404-5_15"}],"event":{"name":"2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)","location":"Toronto, ON","start":{"date-parts":[[2017,9,24]]},"end":{"date-parts":[[2017,9,27]]}},"container-title":["2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8283330\/8287863\/08288327.pdf?arnumber=8288327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T21:59:45Z","timestamp":1521496785000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8288327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/vtcfall.2017.8288327","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}