{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:06:34Z","timestamp":1756512394042,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T00:00:00Z","timestamp":1706227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,26]]},"DOI":"10.1145\/3640824.3640864","type":"proceedings-article","created":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T12:05:28Z","timestamp":1709899528000},"page":"253-260","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An AUTOSAR Crypto Stack System for Supporting Automotive Electronic Information Security"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1766-4333","authenticated-orcid":false,"given":"Yufeng","family":"Xu","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1249-2337","authenticated-orcid":false,"given":"Jiapeng","family":"Xiu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5012-981X","authenticated-orcid":false,"given":"Bin","family":"Wen","sequence":"additional","affiliation":[{"name":"Beijing Siener Electronics Tech. Development Co. Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7128-7166","authenticated-orcid":false,"given":"Zhengqiu","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3826-2578","authenticated-orcid":false,"given":"Shudi","family":"Wu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3498-1438","authenticated-orcid":false,"given":"Weiwen","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Siener Electronics Tech. Development Co. Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,8]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/JPROC.2019.2961937"},{"key":"e_1_3_2_1_2_1","volume-title":"Wei Xinyue A Review of Vehicle Networking Security Standards[J\/OL]. Computer Application Research:1-12[2023-11-30]. https:\/\/doi. org\/10. 19734\/j. issn. 1001-3695","author":"Xiaoqiang Di","year":"2023","unstructured":"Di Xiaoqiang, Cao Jinhui, Wei Xinyue A Review of Vehicle Networking Security Standards[J\/OL]. Computer Application Research:1-12[2023-11-30]. https:\/\/doi. org\/10. 19734\/j. issn. 1001-3695. 2023. 07. 0346."},{"key":"e_1_3_2_1_3_1","volume-title":"Design and Implementation of Hardware Security Module for In-Vehicle Systems[D]","author":"Zihao Zhou","year":"2022","unstructured":"Zhou Zihao. Design and Implementation of Hardware Security Module for In-Vehicle Systems[D]. Huazhong University of Science and Technology, 2022. DOI:10. 27157\/d. cnki. ghzku. 2022. 004900."},{"unstructured":"AUTOSAR Classic Platform Release Overview [OL]. http:\/\/www. autosar. org\/.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"Research and Development of encryption Stack Architecture in AUTOSAR[D]","author":"Huixian Gao","year":"2022","unstructured":"Gao Huixian. Research and Development of encryption Stack Architecture in AUTOSAR[D]. Beijing University of Posts and Telecommunications, 2022."},{"unstructured":"AUTOSAR_SRS_CryptoStack[EB\/OL]. http:\/\/www. autosar. org. 2018","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"10","article-title":"Guidelines for the Construction of Network Security and Data Security Standard Systems for the Internet of Vehicles","volume":"2022","author":"Industry Ministry","unstructured":"Ministry of Industry and Information Technology issues \"Guidelines for the Construction of Network Security and Data Security Standard Systems for the Internet of Vehicles\"[N]. China Computer Newspaper, 2022-03-14(004). DOI:10. 28468\/n. cnki. njsjb. 2022. 000033.","journal-title":"[N]. China Computer Newspaper"},{"key":"e_1_3_2_1_8_1","volume-title":"Zhengzhou Xinda Jianan Information Technology Co","author":"Jinhui Peng","year":"2019","unstructured":"Peng Jinhui, XD_VHSM Virtual Hardware Security Module Software V2. 0, Zhengzhou Xinda Jianan Information Technology Co. , Ltd. , Henan Province, 2019-06-01."},{"key":"e_1_3_2_1_9_1","volume-title":"Design and Application of Hardware Security Module[D]","author":"Jiahang Hu","year":"2018","unstructured":"Hu Jiahang. Design and Application of Hardware Security Module[D]. University of Electronic Science and Technology of China, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.13306\/j.1006-9798.2023.01.011"},{"issue":"05","key":"e_1_3_2_1_11_1","first-page":"48","volume":"53","author":"Pengrui Yang","year":"2023","unstructured":"Yang Pengrui. Design and Implementation of Embedded Software Encryption Method Based on ARM. Aviation Computing Technology, 2023, 53(05): 48-51.","journal-title":"Aviation Computing Technology"},{"key":"e_1_3_2_1_12_1","first-page":"10","volume-title":"Schmelz B. Adaptive AUTOSAR for High-Performance In-Vehicle Computing Platforms Meeting Future Demands. Automotive Manufacturing","author":"Pallierer","year":"2020","unstructured":"Pallierer R, Schmelz B. Adaptive AUTOSAR for High-Performance In-Vehicle Computing Platforms Meeting Future Demands. Automotive Manufacturing, 2020, (09): 10-13."}],"event":{"acronym":"CCEAI 2024","name":"CCEAI 2024: 2024 8th International Conference on Control Engineering and Artificial Intelligence","location":"Shanghai China"},"container-title":["2024 8th International Conference on Control Engineering and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640824.3640864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3640824.3640864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:45:49Z","timestamp":1756485949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3640824.3640864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,26]]},"references-count":12,"alternative-id":["10.1145\/3640824.3640864","10.1145\/3640824"],"URL":"https:\/\/doi.org\/10.1145\/3640824.3640864","relation":{},"subject":[],"published":{"date-parts":[[2024,1,26]]},"assertion":[{"value":"2024-03-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}