{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275382,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905328","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Authentication of Electronic Control Unit using Arbiter Physical Unclonable Functions in Modern Automobiles"],"prefix":"10.1145","author":[{"family":"Aishwarya","sequence":"first","affiliation":[{"name":"Bharati Vidyapeeth's College of Engineering for Women, Pune"}]},{"given":"Farha","family":"Syed","sequence":"additional","affiliation":[{"name":"Bharati Vidyapeeth's College of Engineering for Women, Pune"}]},{"given":"Jaya","family":"Nupur","sequence":"additional","affiliation":[{"name":"Bharati Vidyapeeth's College of Engineering for Women, Pune"}]},{"given":"Aishwarya","family":"Vichare","sequence":"additional","affiliation":[{"name":"Bharati Vidyapeeth's College of Engineering for Women, Pune"}]},{"given":"Arun","family":"Mishra","sequence":"additional","affiliation":[{"name":"Defence Institute of Advanced Technology, Pune"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Vehicular Technology Conference, (Apr.","author":"Asim M.","year":"2009","unstructured":"Asim , M. , Guajardo , J. , Kumar , S. S. and Tuyls , P . 2009. Physical Unclonable Functions and Their Applications to Vehicle System Security . In Vehicular Technology Conference, (Apr. 2009 ), 1--5. Asim, M., Guajardo, J., Kumar, S. S. and Tuyls, P. 2009. Physical Unclonable Functions and Their Applications to Vehicle System Security. In Vehicular Technology Conference, (Apr. 2009), 1--5."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Bohm C. and Hofer M. 2013. Physical Unclonable Functions in Theory and Practice. Springer Science + Business Media New York. Bohm C. and Hofer M. 2013. Physical Unclonable Functions in Theory and Practice. Springer Science + Business Media New York.","DOI":"10.1007\/978-1-4614-5040-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.26"},{"key":"e_1_3_2_1_4_1","volume-title":"SEC'11: Proceedings of the 20th USENIX conference on Security, (Aug.","author":"Checkoway S.","year":"2011","unstructured":"Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. , Shacham , H. , Savage , S. , Koscher , K. , Czeskis , A. , Roesner , F. and Kohno T . 2011. Comprehensive experimental analyses of automotive attack surfaces . In SEC'11: Proceedings of the 20th USENIX conference on Security, (Aug. 2011 ). Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F. and Kohno T. 2011. Comprehensive experimental analyses of automotive attack surfaces. In SEC'11: Proceedings of the 20th USENIX conference on Security, (Aug. 2011)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Fang Z. Lu S. Qu G. and Gao S. 2015. ETBAC-Based Model In Media Oriented System Transport Network. In IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM) (Oct. 2015) 504--511. Fang Z. Lu S. Qu G. and Gao S. 2015. ETBAC-Based Model In Media Oriented System Transport Network. In IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM) (Oct. 2015) 504--511.","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.72"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2010.24"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2014.72"},{"key":"e_1_3_2_1_9_1","volume-title":"Hardware Design of Automobile Door with Local Interconnect Network Bus. In International Conference on Control, Automation and Systems Engineering (CASE), (Jul.","author":"Li Y.","year":"2011","unstructured":"Li , Y. and Zhaoxia , X . 2011 . Hardware Design of Automobile Door with Local Interconnect Network Bus. In International Conference on Control, Automation and Systems Engineering (CASE), (Jul. 2011 ), 1--4. Li, Y. and Zhaoxia, X. 2011. Hardware Design of Automobile Door with Local Interconnect Network Bus. In International Conference on Control, Automation and Systems Engineering (CASE), (Jul. 2011), 1--4."},{"key":"e_1_3_2_1_10_1","volume-title":"International Journal of Computer Applications (IJCA), (Jun.","author":"Lone F. R.","year":"2013","unstructured":"Lone , F. R. , Puri , A. and Kumar , S . 2013. Performance Comparison of Reed Solomon Code and BCH Code over Rayleigh Fading Channel . In International Journal of Computer Applications (IJCA), (Jun. 2013 ), 23--26. Lone, F. R., Puri, A. and Kumar, S. 2013. Performance Comparison of Reed Solomon Code and BCH Code over Rayleigh Fading Channel. In International Journal of Computer Applications (IJCA), (Jun. 2013), 23--26."},{"key":"e_1_3_2_1_11_1","volume-title":"International Journal on Information Theory (IJIT), (Jul.","author":"Mathew P.","year":"2014","unstructured":"Mathew , P. , Augustine , L. , Sabarinath G. and Devis T . 2014. Hardware Implementation of (63,51) BCH Encoder and Decoder for WBAN using LFSR and BMA . In International Journal on Information Theory (IJIT), (Jul. 2014 ). Mathew, P., Augustine, L., Sabarinath G. and Devis T. 2014. Hardware Implementation of (63,51) BCH Encoder and Decoder for WBAN using LFSR and BMA. In International Journal on Information Theory (IJIT), (Jul. 2014)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08","author":"Nilsson D. K.","year":"2009","unstructured":"Nilsson , D. K. , Larson , U. E. , Picasso , F. and Jonsson , E . 2009. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay . In Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08 , ( Sept. 2009 ), 84--91. Nilsson, D. K., Larson, U. E., Picasso, F. and Jonsson, E. 2009. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay. In Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08, (Sept. 2009), 84--91."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.16"},{"key":"e_1_3_2_1_14_1","unstructured":"Proteus 8. http:\/\/www.labcenter.com\/index.cfm\/. Proteus 8. http:\/\/www.labcenter.com\/index.cfm\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ranjan B. and Gupta M. 2013. Automobile Control System using Controller Area Network. In International Journal of Computer Applications (Apr.2013). Ranjan B. and Gupta M. 2013. Automobile Control System using Controller Area Network. In International Journal of Computer Applications (Apr.2013).","DOI":"10.5120\/11498-7210"},{"key":"e_1_3_2_1_16_1","unstructured":"Saraswat H. Sharma G. Mishra S. K. and Vishwajeet 2012. Performance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel. In International Journal of Electronics and Communication Engineering 235--244. Saraswat H. Sharma G. Mishra S. K. and Vishwajeet 2012. Performance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel. In International Journal of Electronics and Communication Engineering 235--244."},{"key":"e_1_3_2_1_17_1","unstructured":"Shinde A. S. and Prof. Dharmadhikari V. B. 2012. Controller Area Network for Vehicle Automation. In International Journal of Emerging Technology and Advanced Engineering 2(2). Shinde A. S. and Prof. Dharmadhikari V. B. 2012. Controller Area Network for Vehicle Automation. In International Journal of Emerging Technology and Advanced Engineering 2(2)."},{"key":"e_1_3_2_1_18_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE), (Mar.","author":"Sreedhar A.","year":"2011","unstructured":"Sreedhar , A. and Kundu , S . 2011. Physically Unclonable Functions for Embeded Security based on Lithographic Variation. In Design , Automation & Test in Europe Conference & Exhibition (DATE), (Mar. 2011 ), 1--6. Sreedhar, A. and Kundu, S. 2011. Physically Unclonable Functions for Embeded Security based on Lithographic Variation. In Design, Automation & Test in Europe Conference & Exhibition (DATE), (Mar. 2011), 1--6."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278480.1278484"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE International Conference on Computer Design (ICCD), (Oct.","author":"Zahran M.","year":"2010","unstructured":"Zahran , M. , Karri , R. and Kanuparthi , A. K . 2010. Feasibility study of dynamic Trusted Platform Module . In IEEE International Conference on Computer Design (ICCD), (Oct. 2010 ), 350--355. Zahran, M., Karri, R. and Kanuparthi, A. K. 2010. Feasibility study of dynamic Trusted Platform Module. In IEEE International Conference on Computer Design (ICCD), (Oct. 2010), 350--355."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2315743"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":21,"alternative-id":["10.1145\/2905055.2905328","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905328","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}