Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Blom, Rolf"'
Publikováno v:
2023 IEEE Vehicular Networking Conference (VNC), Istanbul, Turkiye, 2023, pp. 239-246
Modern automotive functions are controlled by a large number of small computers called electronic control units (ECUs). These functions span from safety-critical autonomous driving to comfort and infotainment. ECUs communicate with one another over m
Externí odkaz:
http://arxiv.org/abs/2306.14782
Autor:
Arfaoui, Ghada, Bisson, Pascal, Blom, Rolf, Borgaonkar, Ravishankar, Englund, Håkan, Félix, Edith, Klaedtke, Felix, Nakarmi, Prajwol Kumar, Näslund, Mats, O’Hanlon, Piers, Papay, Juri, Suomalainen, Jani, Surridge, Mike, Wary, Jean-Philippe, Zahariev, Alexander
Publikováno v:
Arfaoui, G, Bisson, P, Blom, R, Borgaonkar, R, Englund, H, Felix, E, Klaedtke, F, Nakarmi, P K, Naslund, M, O'Hanlon, P, Papay, J, Suomalainen, J, Surridge, M, Wary, J P & Zahariev, A 2018, ' A Security Architecture for 5G Networks ', IEEE Access, vol. 6, pp. 22466-22479 . https://doi.org/10.1109/ACCESS.2018.2827419
IEEE Access, Vol 6, Pp 22466-22479 (2018)
IEEE Access, Vol 6, Pp 22466-22479 (2018)
5G networks will provide opportunities for the creation of new services, for new business models, and for new players to enter the mobile market. The networks will support efficient and cost-effective launch of a multitude of services, tailored for d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::66fa2ecd81f613bc6e3366cd116541e3
https://cris.vtt.fi/en/publications/8cbeec51-bd8d-40d4-b985-498ac8536108
https://cris.vtt.fi/en/publications/8cbeec51-bd8d-40d4-b985-498ac8536108
Autor:
Redana, Simone, Bulakci, Ömer, Galis, Alex, Blom, Rolf, Vaishnavi, Ishan, Gutierrez Estevez, David, Queseth, Olav, Salsano, Stefano, Thomson, John, Gavras, Anastasius
The 5G Architecture Working Group as part of the 5GPPP Initiative is looking at capturing novel trends and key technological enablers for the realization of the 5G architecture. It also targets at presenting in a harmonized way the architectural conc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::74ee69fbbfeb7e98163a6dea6507a682
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Maximov, Alexander, Naslund, Mats, Stahl, Per, Correndo, Gianluca, Krivcovs, Vadims, Phillips, Stephen, Lehtovirta, Vesa, Torvinen, Vesa, Klaedtke, Felix, Heikkinen, Seppo, Pernila, Tommi, Lach, Hon-Yon, Maknavicius, Linas, Arfaoui, Ghada, Wary, Jean-Philppe, Borgaonkar, Ravishankar, O'Hanlon, Piers, Blom, Rolf, Svensson, Martin, Keller, Sebastien, Felix, Edith, Bisson, Pascal, Manersalo, Petteri, Ruuska, Pekka, Suomalainen, Jani, Vehkapera, Janne
This deliverable (D2.4) of the 5G-ENSURE project describes a draft security architecture for 5G networks. The focus lies on a logical and functional architecture and omits (most) aspects related to physical/deployment architecture. This focus is moti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______348::2bb8e101537328cefe54e541dd50109b
https://eprints.soton.ac.uk/408438/
https://eprints.soton.ac.uk/408438/
Autor:
Blom, Rolf, Schwarz, Oliver
With commodity operating systems failing to establish unbreakable isolation of processes, there is a need for stronger separation mechanisms. A recently launched open source project aims at applying virtualization to achieve such isolation on the wid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______681::b7a6bf1af8c7ed41f5a1740e10ae174f
http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24462
http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24462
Autor:
Goos, G., Hartmanis, J., Barstow, D., Brauer, W., Brinch Hansen, P., Gries, D., Luckham, D., Moler, C., Pnueli, A., Seegmüller, G., Stoer, J., Wirth, N., Beth, Thomas, Cot, Norbert, Ingemarsson, Ingemar, Blom, Rolf
Publikováno v:
Advances in Cryptology; 1985, p335-338, 4p
Data encryption and related methods may be used to preserve information security i n a data network. Here information security is defined as the degree to which the destruction, change or loss of information is presented. Information is defined as th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::b19f38e6629429bbb3aa7e32b1585d35
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131837
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131837
Autor:
Blom, Rolf
The algebraic structure of the set of enciphering trans formations of a pure cipher is analysed. An alternative definition of pure ciphers is given and necessary and sufficient conditions for the product of two pure ciphers to be pure is found.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______681::8c25a6bf611a18b1e91527b54ce67683
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131964
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131964
The goal of COMPUTER SECURITY 1981 is to prediet the demand for protection of eleetronic data processing (EDP) and for the information processed. To predict the future demands on computer security we have discussed the issue with several people invol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::a6c435b57831fe00aedefc3354cc3188
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131834
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131834