-
1
-
-
33847400141
-
-
1st ed, John Wiley & Sons, November, ISBN 0764597876, pp
-
st ed.), John Wiley & Sons, November 2005, ISBN 0764597876, pp. 1-22.
-
(2005)
Securing Scada Systems
, pp. 1-22
-
-
Rrutz, R.L.1
-
2
-
-
57649124790
-
Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems
-
US General Accounting Office, GAO-04-354, 2004
-
US General Accounting Office, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Report to Congress, GAO-04-354, 2004.
-
Report to Congress
-
-
-
3
-
-
51349108057
-
Power system control & associated communications - Data & communication security
-
IEC International Electrotechnical Commission
-
IEC (International Electrotechnical Commission), Power system control & associated communications - Data & communication security, IEC62351 part 1 to 7, Technical Specification, 2007.
-
(2007)
to 7, Technical Specification
, vol.IEC62351
, Issue.PART 1
-
-
-
5
-
-
51249195967
-
IT Security techniques - Key management
-
IEC/ISO
-
IEC/ISO, IT Security techniques - Key management, IEC/ISO11770, International Standard.
-
IEC/ISO11770, International Standard
-
-
-
6
-
-
51349123251
-
SKMA, A Key Management Architecture for SCADA Systems
-
ACM
-
R. Dawson, C. Boyd, E. Dawson and JMG. Nieto, "SKMA, A Key Management Architecture for SCADA Systems", Proc. of the AISW-NetSec workshop, ACM, 2006.
-
(2006)
Proc. of the AISW-NetSec workshop
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Nieto, J.M.G.4
-
8
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. Needham, M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers" Communications of the ACM, Vol. 21, pp. 993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
9
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
G. Lowe, "An attack on the Needham-Schroeder public key authentication protocol", Information Processing Letters, vol. 56(3), pp. 131-136, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
10
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
B. C. Neuman, Theodore Ts'o, "Kerberos: An Authentication Service for Computer Networks", IEEE Communications, volume 32/9, pp33-38, 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
11
-
-
28144446331
-
-
RFC 4120, IETF
-
C. Neuman, T. Yu, S. Hartman, K. Raeburn, "The Kerberos Network Authentication Service (V5)", RFC 4120, IETF, 2005.
-
(2005)
The Kerberos Network Authentication Service (V5)
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
12
-
-
51349147794
-
-
IEC/ISO, IT - Security techniques - Entity authentication, IEC/ISO9798-5:2004, International Standard.
-
IEC/ISO, IT - Security techniques - Entity authentication, IEC/ISO9798-5:2004, International Standard.
-
-
-
-
13
-
-
51349154429
-
-
ITU (International Telecommunication Union), Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, ITU-T Recommendation X.509, 2005.
-
ITU (International Telecommunication Union), "Information Technology - Open Systems Interconnection - The Directory: Authentication Framework", ITU-T Recommendation X.509, 2005.
-
-
-
-
15
-
-
51349125014
-
-
October
-
P. Gutmann, X509 Style Guide, October 2000, http://www.cs.auckland.ac.nz/ ~pgut001/
-
(2000)
X509 Style Guide
-
-
Gutmann, P.1
-
16
-
-
2542521157
-
-
1st ed, Wiley, ISBN 0471223573, pp
-
st ed.), Wiley, ISBN 0471223573, pp. 315-345, 2003.
-
(2003)
Practical Cryptography
, pp. 315-345
-
-
Ferguson, N.1
Schneier, B.2
-
18
-
-
51349143333
-
Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures
-
San Francisco, USA
-
B. Kaliski, "Learning to SKI Again: The Renaissance of Symmetric Key Infrastructures", Proc. RSA Conference, San Francisco, USA, 2007.
-
(2007)
Proc. RSA Conference
-
-
Kaliski, B.1
-
20
-
-
51349114895
-
Secure DNP3 specifications
-
DNP User Group
-
DNP User Group, Secure DNP3 specifications, DNP User Group Library (www.dnp.org), 2007.
-
(2007)
DNP User Group Library
-
-
-
21
-
-
51349107593
-
Learning from European Advanced Metering Deployments
-
June
-
J. Lund, "Learning from European Advanced Metering Deployments", Utility Automation & Engineering June 2007
-
(2007)
Utility Automation & Engineering
-
-
Lund, J.1
-
23
-
-
51349083426
-
Key Management and Cryptography for Advanced Metering Infrastructures (AMI) and Other Large, Low Power Networks
-
Miami
-
G. Gilchrist & D. Highfill, "Key Management and Cryptography for Advanced Metering Infrastructures (AMI) and Other Large, Low Power Networks", Proc. of the S4 2008 Conference, Miami, 2008.
-
(2008)
Proc. of the S4 2008 Conference
-
-
Gilchrist, G.1
Highfill, D.2
-
24
-
-
17744384943
-
Key management for SCADA
-
Technical Report SAND2001-3252, Sandia National Laboratories
-
C. Beaver, D. Gallup, W. Neumann & Torgerson M., "Key management for SCADA", Technical Report SAND2001-3252, Sandia National Laboratories, 2002.
-
(2002)
-
-
Beaver, C.1
Gallup, D.2
Neumann, W.3
Torgerson, M.4
-
25
-
-
33845929407
-
Cyber Security for Utility Operations
-
NETL Project M63SNL34, Final Report
-
D. Holstein, J. Tengdin, J. Wack, R. Butler, T. Draelos, P. Blomgren, Cyber Security for Utility Operations, NETL Project M63SNL34, Final Report, 2005.
-
(2005)
-
-
Holstein, D.1
Tengdin, J.2
Wack, J.3
Butler, R.4
Draelos, T.5
Blomgren, P.6
-
27
-
-
11244267013
-
-
Springer-Verlag, Berlin, Germany
-
S. Hankerson, A. Menezes, Guide to Elliptic Curve Cryptography, Springer-Verlag, Berlin, Germany, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, S.1
Menezes, A.2
-
28
-
-
51349104530
-
-
ECRYPT (European Network of Excellence in Cryptology), ECRYPT Yearly Report on Algorithms and Keysizes (D.SPA.10), ECRYPT IST European Project, 2005.
-
ECRYPT (European Network of Excellence in Cryptology), ECRYPT Yearly Report on Algorithms and Keysizes (D.SPA.10), ECRYPT IST European Project, 2005.
-
-
-
-
29
-
-
84948990367
-
How to Explain Zero-Knowledge Protocols to Your Children
-
Springer, pp
-
Jean-Jacques Quisquater, Louis C. Guillou, Thomas A. Berson, "How to Explain Zero-Knowledge Protocols to Your Children", Proc. of Crypto '89, Springer, pp.628-631, 1990.
-
(1990)
Proc. of Crypto '89
, pp. 628-631
-
-
Quisquater, J.-J.1
Guillou, L.C.2
Berson, T.A.3
-
30
-
-
0009582826
-
The SRP Authentication and Key Exchange System
-
IETF
-
T. Wu, "The SRP Authentication and Key Exchange System", Request for Comments (RFC) 2945, IETF, 2000.
-
(2000)
Request for Comments (RFC) 2945
-
-
Wu, T.1
-
32
-
-
0037056208
-
Achievement of secure Internet access to fieldbus systems
-
Elsevier
-
T. Sauter and Ch. Schwaiger, "Achievement of secure Internet access to fieldbus systems", Microprocessors and Microsystems Journal, Elsevier, Vol. 26, Issue 7, 2002.
-
(2002)
Microprocessors and Microsystems Journal
, vol.26
, Issue.7
-
-
Sauter, T.1
Schwaiger, C.2
-
34
-
-
27744579515
-
Implications of power-line communication on distributed data acquisition and control systems
-
M. Lobashov, G. Pratl, and T. Sauter, "Implications of power-line communication on distributed data acquisition and control systems", in Proc. International IEEE Conference Emerging Technologies and Factory Automation 2003 (ETFA '03), vol. 2, pp. 607-613, 2003.
-
(2003)
Proc. International IEEE Conference Emerging Technologies and Factory Automation 2003 (ETFA '03)
, vol.2
, pp. 607-613
-
-
Lobashov, M.1
Pratl, G.2
Sauter, T.3
-
35
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
IEEE CS
-
A. Perrig, R. Canetti, J. Tygar & D. Song, "Efficient authentication and signing of multicast streams over lossy channels", Proc. of the IEEE S&P Symp., IEEE CS, 2000.
-
(2000)
Proc. of the IEEE S&P Symp
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
36
-
-
51349086981
-
sSCADA: Securing SCADA Infrastructure Communications
-
Y. Wang, B. Chu, "sSCADA: Securing SCADA Infrastructure Communications", IACR Eprint, 2004.
-
(2004)
IACR Eprint
-
-
Wang, Y.1
Chu, B.2
-
37
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A Perrig, R. Szewczyk, V. Wen, D. Culler and J. Tygar, "Spins: Security protocols for sensor networks", Wireless Networks Journal (WINE), September 2002.
-
(2002)
Wireless Networks Journal (WINE)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
38
-
-
51349098629
-
Identity-Based Key Agreement and Encryption for Wireless Sensor Networks
-
G. Yang, C. Rong, C. Veigner, J. Wang, and H. Cheng, "Identity-Based Key Agreement and Encryption for Wireless Sensor Networks", IJCSNS International Journal of Computer Science and Network Security, Vol.6 No.5B, 2006.
-
(2006)
IJCSNS International Journal of Computer Science and Network Security
, vol.6
, Issue.5 B
-
-
Yang, G.1
Rong, C.2
Veigner, C.3
Wang, J.4
Cheng, H.5
-
39
-
-
0012970453
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing", Proc. of CRYPTO'01, Springer, 2001.
-
(2001)
Proc. of CRYPTO'01
-
-
Boneh, D.1
Franklin, M.2
-
40
-
-
34250659309
-
Key management for long-lived sensor networks in hostile environments
-
M. Chorzempa, J-M. Park, M.Eltoweissy, "Key management for long-lived sensor networks in hostile environments", ACM Computer Communications, Volume 30, Issue 9, pp. 1964-1979, 2007.
-
(2007)
ACM Computer Communications
, vol.30
, Issue.9
, pp. 1964-1979
-
-
Chorzempa, M.1
Park, J.-M.2
Eltoweissy, M.3
-
41
-
-
34247224664
-
Key distribution mechanisms for wireless sensor networks: A survey
-
Technical Report 05-07, Rensselaer Polytechnic Institute
-
A. Camtepe, B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey", Technical Report 05-07, Rensselaer Polytechnic Institute, 2005.
-
(2005)
-
-
Camtepe, A.1
Yener, B.2
-
42
-
-
51249195966
-
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
-
Springer
-
C. Alcaraz & R. Roman, "Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios", Proceedings of CRITIS'06 Conference, Springer, 2006.
-
(2006)
Proceedings of CRITIS'06 Conference
-
-
Alcaraz, C.1
Roman, R.2
|