Art
J-GLOBAL ID:201702284214807956   Reference number:17A1269712

A study on a secure protocol against tampering and replay attacks focused on data field of CAN

CANのデータ領域に焦点を置いた改ざんと再生攻撃に対する安全なプロトコルの検討【Powered by NICT】
Author (4):
Material:
Volume: 2017  Issue: ICCE-Taiwan  Page: 247-248  Publication year: 2017 
JST Material Number: W2441A  Document type: Proceedings
Article type: 原著論文  Country of issue: United States (USA)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
In the presented paper, we wil...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=17A1269712&from=J-GLOBAL&jstjournalNo=W2441A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
JST classification (1):
JST classification
Category name(code) classified by JST.
Code theory 
Terms in the title (6):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page