2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA) 2015
DOI: 10.1109/aiccsa.2015.7507198
|View full text |Cite
|
Sign up to set email alerts
|

A hardware accelerator for the IEEE 802.1X-2010 key hierarchy in automotive applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…In terms of academic research, Sommer et al [18] have a detailed classification of automotive attacks, including 23 different categories, according to the description of the attack, a violation of the security attribute or the exploit of a vulnerability, and so on. Carnevale et al [19] provided a hardware accelerator architecture for key derivation and encryption required by IEEE 802.1X-2010 in automotive applications, and for further research, IEEE 802.1AE was also implemented by Carnevale [20,21]. e three researchers are all hardware support for automotive Ethernet security.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of academic research, Sommer et al [18] have a detailed classification of automotive attacks, including 23 different categories, according to the description of the attack, a violation of the security attribute or the exploit of a vulnerability, and so on. Carnevale et al [19] provided a hardware accelerator architecture for key derivation and encryption required by IEEE 802.1X-2010 in automotive applications, and for further research, IEEE 802.1AE was also implemented by Carnevale [20,21]. e three researchers are all hardware support for automotive Ethernet security.…”
Section: Related Workmentioning
confidence: 99%