1 |
Atallah, R.F.,Khabbaz, M.J.,Assi, C.M., Vehicular networking: A survey on spectrum access technologies and persisting challenges. Vehicular Communications, Vol. 2, Issue. 3, pp. 125-149, 2015.
DOI
ScienceOn
|
2 |
Zhu, X., Lu, Y., Zhu, X., Qiu, S., Lightweight and scalable secure communication in VANET. International Journal of Electronics, Vol. 102, Issue. 5, pp. 765-780, 2015.
DOI
ScienceOn
|
3 |
Hoque, M.A.,Hong, X.,Dixon, B., Efficient multi-hop connectivity analysis in urban vehicular networks. Vehicular Communications, Vol. 1, Issue. 2, pp. 78-90, 2014.
DOI
ScienceOn
|
4 |
Aiash M, Mapp G, Lasebae A, Phan R., A survey on authentication and key agreement protocols in heterogeneous networks. International Journal of Network Security & Its Applications, Vol. 4, No. 4, pp. 199-214, 2012.
DOI
|
5 |
Keun-Ho Lee, A Security Threats in Wireless Charger Systems in M2M. Journal of the Korea Convergence Society, Vol. 4, No. 1, pp. 27-31, 2013.
DOI
|
6 |
Seung-Hwan Kim, Keun-Ho Lee, User Authentication Risk and Countermeasure in Intelligent Vehicles. Journal of the Korea Convergence Society, Vol. 3, No. 1, pp. 7-11, 2012.
|
7 |
WooSik Bae, Inter-device Mutual authentication and Formal Verification in M2M Environment. The Journal of Digital Convergence, Vol. 12, No. 9, pp. 219-224, 2014.
DOI
|
8 |
Qi X., A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2011; 25:47-54. DOI: 10.1002/dac.1286.
DOI
ScienceOn
|
9 |
ISO 26262, Road vehicles - Functional safety, Management of functional safety & Concept phase
|
10 |
Aiash M, Mapp G, Lasebae A, Phan R, Loo J., A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking, Vol. 57, pp. 1-23, 2012.
|
11 |
M. S. Han, W. S. Bae, Security Verification of a Communication Authentication Protocol in Vehicular Security System. Journal of Digital Convergence, Vol. 12, No. 8, pp. 229-234, 2014.
DOI
|
12 |
W. S. Bae, Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code. Wireless Personal Communications An International Journal, Vol. 79, No. 4, pp. 2295-1609, 2014.
|
13 |
G. Lowe. Casper: A compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12, 2009.
|
14 |
Weis, S. et al., Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Security in Pervasive Computing, Vol. 2802, pp. 201-212, 2003.
|
15 |
Formal systems (Europe) Ltd.: Failures-Divergence Re finement. FDR2 User Manual, 2011.
|
16 |
PRESERVE(PREparing SEcuRe VEhicle-to-X Communication Systems)Deliverable 1.1, Security Requirements of Vehicle Security Architecture, 2011.
|