메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Security considerations for the wirelessHART protocol

Author keywords

[No Author keywords available]

Indexed keywords

INDUSTRIAL PROCESSS; NETWORK MANAGERS; RELIABLE COMMUNICATION; SECURITY CONSIDERATIONS; SECURITY MANAGER; SECURITY MECHANISM; SECURITY REQUIREMENTS; SHORT-COMINGS; WIRELESS MEDIUM; WIRELESSHART;

EID: 77949891992     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ETFA.2009.5347043     Document Type: Conference Paper
Times cited : (57)

References (27)
  • 1
    • 77949877953 scopus 로고    scopus 로고
    • 9390 Research Blvd
    • HART Communication Foundation HCF, Austin TX USA
    • HART Communication Foundation (HCF). 9390 Research Blvd., Suit I-350 Austin TX 78759 USA. http://www.hartcomm2.org/index.html.
    • Suit I-350 , pp. 78759
  • 9
    • 51049114271 scopus 로고    scopus 로고
    • 10th international workshop on Cryptographic Hardware and Embedded Systems
    • 30-44
    • A. Bogdanoy. Multiple-differential side-channel collision attacks on aes, lecture notes in computer science. 10th international workshop on Cryptographic Hardware and Embedded Systems, 5154(2):30-44, 2008.
    • (2008) , vol.5154 , Issue.2
    • Bogdanoy, A.1
  • 12
    • 37349004156 scopus 로고    scopus 로고
    • Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
    • May
    • M. Dworkin. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800-38C, May 2004.
    • (2004) NIST Special Publication , vol.800-38C
    • Dworkin, M.1
  • 17
    • 0020707363 scopus 로고
    • Evaluation of the undetected error probability of single parity-check product codes
    • C. Leung. Evaluation of the undetected error probability of single parity-check product codes. IEEE Transactions on Communications, 31(2):250-253, 1983.
    • (1983) IEEE Transactions on Communications , vol.31 , Issue.2 , pp. 250-253
    • Leung, C.1
  • 19
    • 2642584905 scopus 로고    scopus 로고
    • Impossible differential cryptanalysis of 7-round aes
    • R. C.-W. Phan. Impossible differential cryptanalysis of 7-round aes. Information Processing Letters, 91(1):33-38, 2004.
    • (2004) Information Processing Letters , vol.91 , Issue.1 , pp. 33-38
    • Phan, R.C.-W.1
  • 20
  • 25
    • 77949897173 scopus 로고    scopus 로고
    • H.Wang and Q. Li. Efficient implementation of public key cryptosystems on mote sensors. In Proceedings of International Conference on Information and Communication Security (ICICS), pages 33-38, 2004.
    • H.Wang and Q. Li. Efficient implementation of public key cryptosystems on mote sensors. In Proceedings of International Conference on Information and Communication Security (ICICS), pages 33-38, 2004.
  • 26
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • H. Wang, B. Sheng, and Q. Li. Elliptic curve cryptography-based access control in sensor networks. International Journal of Security and Networks, 1(3/4):127-137, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.