![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs38311-013-0111-x/MediaObjects/38311_2013_111_Fig1_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs38311-013-0111-x/MediaObjects/38311_2013_111_Fig2_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs38311-013-0111-x/MediaObjects/38311_2013_111_Fig3_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs38311-013-0111-x/MediaObjects/38311_2013_111_Fig4_HTML.jpg)
References
Cloud Security Alliance: Cloud Computing Vulnerability Incidents, A Statistical Overview. In: https://cloudsecurityalliance.org/download/cloud-computing-vulnerability-incidents-a-statistical-overview/, 2013
Shannon, Cl. E.: Communication Theory of Secrecy Systems. In: Bell System Technical Journal 28 (1949), No. 4, pp. 656–715: http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Beringer, N. The connected car security boundaries. ATZ Worldw 115, 22–27 (2013). https://doi.org/10.1007/s38311-013-0111-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s38311-013-0111-x