T. Bourke, R.J. van Glabbeek & P. Höfner (2014):
A mechanized proof of loop freedom of the (untimed) AODV routing protocol.
In: F. Cassez & J.-F. Raskin: Automated Technology for Verification and Analysis (ATVA '14),
LNCS 8837.
Springer,
pp. 47–63,
doi:10.1007/978-3-319-11936-6_5.
T. Bourke, R.J. van Glabbeek & P. Höfner (2016):
Mechanizing a Process Algebra for Network Protocols.
Journal of Automated Reasoning 56(3),
pp. 309–341,
doi:10.1007/s10817-015-9358-9.
M.J. Dworkin (2007):
Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC.
NIST Special Publication 800-38D.
National Institute of Standards and Technology (NIST), U.S. Department of Commerce,
doi:10.6028/NIST.SP.800-38D.
K. Etschberger (2001):
Controller Area Network: Basics, Protocols, Chips and Applications.
IXXAT Automation GmbH.
A. Fehnker, R. J. van Glabbeek, P. Höfner, A. K. McIver, M. Portmann & W. L. Tan (2012):
A Process Algebra for Wireless Mesh Networks.
In: H. Seidl: European Symposium on Programming (ESOP '12),
LNCS 7211.
Springer,
pp. 295–315,
doi:10.1007/978-3-642-28869-2_15.
R.J. van Glabbeek, P. Höfner, M. Portmann & W.L. Tan (2016):
Modelling and Verifying the AODV Routing Protocol.
Distributed Computing 29(4),
pp. 279–315,
doi:10.1007/s00446-015-0262-7.
H. Krawczyk, M. Bellare & R. Canetti (1997):
HMAC: Keyed-Hashing for Message Authentication.
RFC 2104 (Informational, Errata Exist).
Available at http://tools.ietf.org/html/rfc2104.
T. Nipkow, L. C. Paulson & M. Wenzel (2002):
Isabelle/HOL — A Proof Assistant for Higher-Order Logic.
LNCS 2283.
Springer,
doi:10.1007/3-540-45949-9.
C. Shin (2014):
A framework for fragmenting/reconstituting data frame in Controller Area Network (CAN).
In: International Conference on Advanced Communication Technology (ICACT '14).
IEEE,
pp. 1261–1264,
doi:10.1109/ICACT.2014.6779161.
C.M. Shin, T.M. Han, H.S. Ham & W.J. Lee (2010):
Method for Transmitting/Receiving Data Frame in CAN Protocol.
Available at http://www.google.com/patents/US20100158045.
US Patent App. 12/543,876.
C. Sommer & F. Dressler (2015):
Vehicular Networking.
Cambridge University Press,
doi:10.1017/CBO9781107110649.
S. Turner & L. Chen (2011):
Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms.
RFC 6151 (Informational).
Available at http://tools.ietf.org/html/rfc6151.