Author of the publication

Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks.

, , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 705-710. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Packet Filtering Module for Vehicular Multi-domain Network., and . ICTC, page 1070-1072. IEEE, (2020)Free-viewpoint based high-resolution 3D data acquisition and generation technology for the construction and diffusion of digital cultural assets., , , and . ICTC, page 2124-2126. IEEE, (2022)Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks., , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 705-710. Springer, (2018)Security Threats in Connected Car Environment and Proposal of In-Vehicle Infotainment-Based Access Control Mechanism., and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 383-388. Springer, (2018)OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication., , , , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 711-716. Springer, (2018)Design and Implementation of Security Threat Detection and Access Control System for Connected Car., , , , and . CSII (selected papers), volume 787 of Studies in Computational Intelligence, page 177-183. Springer, (2018)