Skip to main content

Cyber Security for Cross Domain Reliable Dependable Automated Systems

Deliverables

Single demonstrators working

Single demonstrators working

Demonstrators combined cooperating in to use cases

Demonstrators combined cooperating in to use cases

Security analysis report v2

Security analysis report v2

Initial set of scenarios and use cases

Initial set of scenarios and use cases to be used throughout the project.

Secure connections between wearables, laboratory systems and via a gateway to a research database

Secure connections between wearables, laboratory systems and via a gateway to a research database

Initial ITS station architecture with functional security features

Initial ITS station architecture with functional security features

Final Demonstrators Description

Final description of demonstrators derived from second set of scenarios and use cases

State-of-the-art Analysis and Applicability of Standards

State-of-the-art Analysis and Applicability of Standards

1st dissemination report (overview of press conferences, public workshops, public shows, conference attendance,…)

1st dissemination report (overview of press conferences, public workshops, public shows, conference attendance,…)

Second set of scenarios and use cases

Second set of use cases and scenarios to be used for development and demonstrators in Secredas

Press Conference to launch SECREDAS

Press Conference to launch SECREDAS

Searching for OpenAIRE data...

Publications

A 145GHz FMCW-Radar Transceiver in 28nm CMOS

Author(s): Akshay Visweswaran, Kristof Vaesen, Siddhartha Sinha, Ilja Ocket, Miguel Glassee, Claude Desset, Andre Bourdoux, Piet Wambacq
Published in: International Solid-State Circuits Conference (ISSCC), 2019

Medizinische Sensorik – Innovative Anwendung in Automobilen

Author(s): Michael Wiehl, Jana Viehbeck
Published in: meditronic journal, Issue 3/2018, 2018, Page(s) 14-16

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based

Author(s): David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
Published in: Proceedings 2019 Network and Distributed System Security Symposium, 2019
DOI: 10.14722/ndss.2019.23066

PHY Layer Security within V2X Communication

Author(s): Politechnika Gdańska\ Gdańsk University of Technology
Published in: 2020

Protean Signature Schemes

Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings, Issue 11124, 2018, Page(s) 256-276
DOI: 10.1007/978-3-030-00434-7_13

An Optical Interference Suppression Scheme for TCSPC Flash LiDAR Imagers

Author(s): Lucio Carrara, Adrian Fiergolski
Published in: Applied Sciences, Issue 9/11, 2019, Page(s) 2206, ISSN 2076-3417
DOI: 10.3390/app9112206

Driver Behaviour Modeling With Vehicle Driving Simulator

Author(s): D. Michalik, O. Mihalik, M. Jirgl, P. Fiedler
Published in: IFAC-PapersOnLine, Issue 52/27, 2019, Page(s) 180-185, ISSN 2405-8963
DOI: 10.1016/j.ifacol.2019.12.753

Spectral Super-resolution and Band-limited Extrapolation Using Slepian Series

Author(s): O. Mihálik, D. Michalík, P. Jura, P. Fiedler
Published in: IFAC-PapersOnLine, Issue 52/27, 2019, Page(s) 388-393, ISSN 2405-8963
DOI: 10.1016/j.ifacol.2019.12.691

Using Matlab-based Driving Simulator for Human Factor Assessment

Author(s): M. Jirgl, P. Fiedler, Z. Bradac
Published in: IFAC-PapersOnLine, Issue 52/27, 2019, Page(s) 27-32, ISSN 2405-8963
DOI: 10.1016/j.ifacol.2019.12.727