Computer Science
Authentication
100%
Cryptographic Protocol
14%
Real Time Performance
14%
Secure Communication
14%
Security Properties
14%
Automotive System
14%
Network Protocols
14%
Time Constraint
14%
Communicating Party
14%
Authentication Protocol
14%
Asymmetric Cryptography
14%
Timing Requirement
14%
Cryptographic Algorithm
14%
Lightweight Core
14%
Protocol Verification
14%
Attack Surface
14%
Perimeter Network
14%
Software Update
14%
Computational Resource
14%
Performance Requirement
14%
Keyphrases
Network Lightweight
100%
Vehicle Network
33%
Software Updates
16%
Vehicle Software
16%
Cryptographic Algorithms
16%
Attack Surface
16%
Internet Communication
16%
Authentication Framework
16%
Internal Security
16%
Protocol Verification
16%
Asymmetric Cryptography
16%
Automotive Products
16%