Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
EAI Endorsed Transactions on Security and Safety
Home
About
About the Journal
Submissions
Editorial Team
Indexing
Open Access Information
Benefits of EAI Transactions
Privacy Statement
Contact
Current
Archives
Special Issues
Publication Ethics
Announcements
Search
Register
Login
Home
/
Archives
/
Vol. 3 No. 8 (2016): EAI Endorsed Transactions on Security and Safety
Vol. 3 No. 8 (2016): EAI Endorsed Transactions on Security and Safety
Published:
21-04-2022
Research article
A V2X Message Evaluation Methodology and Cross-Domain Modelling of Safety Applications in V2X-enabled E/E-Architectures
Harald Bucher, Marius-Florin Buciuman, Alexander Klimm, Oliver Sander, Jürgen Becker
e1
PDF
ITFComp: A Compression Algorithm for ARM Architecture Instruction Trace Files
Mohammad Qasem, Lukas Pustina
e2
PDF
Modelling and Simulating Systems Security Policy
Tristan Caulfield, David Pym
e3
PDF
Secret Key Generation by Virtual Link Estimation
Chitra Javali, Girish Revadigar, Ming Ding, Sanjay Jha
e4
PDF
Mobility Independent Secret Key Generation for Wearable Health-care Devices
Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper B. Rasmussen, Sanjay Jha
e5
PDF
Current Issue
Make a Submission
Make a Submission
Keywords
Tweets by @EAIPublishing