-
1
-
-
67650661171
-
Advanced key management architecture for secure SCADA communications
-
Jul.
-
D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key management architecture for secure SCADA communications," IEEE Trans. Power Del., vol.24, no.3, pp. 1154-1163, Jul. 2009.
-
(2009)
IEEE Trans. Power Del.
, vol.24
, Issue.3
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
3
-
-
77950187312
-
KMA-A key management architecture for SCADA systems
-
R. D. Colin, C. Boyd, J. Manuel, and G. Nieto, "KMA-A key management architecture for SCADA systems," in Proc. 4th Australasian Inf. Security Workshop, 2006, vol.54, pp. 138-192.
-
(2006)
Proc. 4th Australasian Inf. Security Workshop
, vol.54
, pp. 138-192
-
-
Colin, R.D.1
Boyd, C.2
Manuel, J.3
Nieto, G.4
-
4
-
-
0038043478
-
Key establishment in large dynamic groups: Using one-way function trees
-
May
-
D. A. McGrew and A. T. Sherman, "Key establishment in large dynamic groups: Using one-way function trees," IEEE Trans. Softw. Eng., vol.29, no.5, pp. 444-458, May 2003.
-
(2003)
IEEE Trans. Softw. Eng.
, vol.29
, Issue.5
, pp. 444-458
-
-
McGrew, D.A.1
Sherman, A.T.2
-
5
-
-
33750405289
-
Security issues in SCADA networks
-
Mar.
-
V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADA networks," in Comput. Security, Mar. 2006, vol.25, pp. 498-506.
-
(2006)
Comput. Security
, vol.25
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
6
-
-
18944405526
-
Key management for large dynamic groups: One-way function trees and amortized initialization
-
D. M. Balenson, D. A. McGrew, and A. T. Sherman, "Key management for large dynamic groups: One-way function trees and amortized initialization, " in IETF Internet Draft, 2000.
-
(2000)
IETF Internet Draft
-
-
Balenson, D.M.1
McGrew, D.A.2
Sherman, A.T.3
-
7
-
-
77950188641
-
Cryptographic protection of SCADA communications part 1: Background
-
Draft 5 revision 3 Amer. Gas Assoc. [Online]. Available
-
Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan, Technical Report 12-21 Draft 5 revision 3 Amer. Gas Assoc., 2005. [Online]. Available: http://www.gtiservice. org/security/
-
(2005)
Policies and Test Plan, Technical Report
, pp. 12-21
-
-
-
8
-
-
0242414397
-
Key management approaches to offer data confidentiality for secure multicast
-
Sep./Oct.
-
K. C. Chan and S. H. Chan, "Key management approaches to offer data confidentiality for secure multicast," IEEE Netw. Commun. Lett., vol.17, no.5, pp. 30-39, Sep./Oct. 2003.
-
(2003)
IEEE Netw. Commun. Lett.
, vol.17
, Issue.5
, pp. 30-39
-
-
Chan, K.C.1
Chan, S.H.2
-
9
-
-
0032178082
-
Secure group communications using key graphs
-
C. K.Wong, H. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proc. ACMSIGCOMM Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication, 1998, pp. 68-79.
-
(1998)
Proc. ACMSIGCOMM Conf. Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 68-79
-
-
Wong, C.K.1
Gouda, H.2
Lam, S.S.3
-
10
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proc. ACM SIGCOMM, 1997, pp. 277-288
-
(1997)
Proc. ACM SIGCOMM
, pp. 277-288
-
-
Mittra, S.1
-
12
-
-
0034838199
-
ELK, a new protocol for efficient large group key distribution
-
A. Perrig, D. Song, and J. D. Tygar, "ELK, a new protocol for efficient large group key distribution," in Proc. IEEE Symp. Security Privacy, 2001, pp. 247-262.
-
(2001)
Proc. IEEE Symp. Security Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
13
-
-
84957692171
-
From differential cryptanalysis to ciphertext- only attacks
-
A. Biryukov and E. Kushilevitz, "From differential cryptanalysis to ciphertext- only attacks," in Proc. CRYPTO, 1998, pp. 72-88.
-
(1998)
Proc. CRYPTO
, pp. 72-88
-
-
Biryukov, A.1
Kushilevitz, E.2
-
14
-
-
51249173191
-
One-way functions and pseudorandom generators
-
L. A. Levin, "One-way functions and pseudorandom generators," Combinatorica, vol.7, no.4, pp. 357-363, 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
, pp. 357-363
-
-
Levin, L.A.1
-
15
-
-
32244432466
-
Attack on the sun-chen-hwang's threeparty key agreement protocols using passwords
-
Jan.
-
J. Nam, S. Kim, and D. Won, "Attack on the sun-chen-hwang's threeparty key agreement protocols using passwords," IEICE Trans. Fundamentals, vol.E89-A, no.1, pp. 1154-1163, Jan. 2006.
-
(2006)
IEICE Trans. Fundamentals
, vol.E89-A
, Issue.1
, pp. 1154-1163
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
16
-
-
33646702345
-
Secure and efficient ID-Based group key agreement fitted for pay-TV
-
Nov.
-
H. Kim, J. Nam, S. Kim, and D. Won, "Secure and efficient ID-Based group key agreement fitted for pay-TV," in Proc. PCM, the 2005 Pacific- Rim Conf. Multimedia, Nov. 2005, pp. 117-128.
-
(2005)
Proc. PCM, the 2005 Pacific- Rim Conf. Multimedia
, pp. 117-128
-
-
Kim, H.1
Nam, J.2
Kim, S.3
Won, D.4
-
17
-
-
19744369256
-
DDH-Based group key agreement in a mobile environment
-
Oct.
-
J. Nam, J. Lee, S. Kim, and D.Won, "DDH-Based group key agreement in a mobile environment," J. Syst. Softw., vol.78, no.1, pp. 73-83, Oct. 2005.
-
(2005)
J. Syst. Softw.
, vol.78
, Issue.1
, pp. 73-83
-
-
Nam, J.1
Lee, J.2
Kim, S.3
Won, D.4
-
18
-
-
26844448244
-
Secure group communications over combined wired and wireless networks
-
Aug.
-
J. Nam, S. Kim, and D.Won, "Secure group communications over combined wired and wireless networks," in Proc. TrustBus Int. Conf. Trust, Privacy, and Security in Digital Business (in conjunction with DEXA 2005), Aug. 2005, pp. 90-99.
-
(2005)
Proc. TrustBus Int. Conf. Trust, Privacy, and Security in Digital Business (in Conjunctionwith DEXA 2005)
, pp. 90-99
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
19
-
-
24944459002
-
An efficient dynamic group key agreement for low-power mobile devices
-
Singapore, May
-
S. Cho, J. Nam, S. Kim, and D.Won, "An efficient dynamic group key agreement for low-power mobile devices," in Proc. Int. Conf. Computational Science Applications, Singapore, May 2005, pp. 498-507.
-
(2005)
Proc. Int. Conf. Computational Science Applications
, pp. 498-507
-
-
Cho, S.1
Nam, J.2
Kim, S.3
Won, D.4
-
20
-
-
35048892094
-
Simple and efficient group key agreement based on factoring
-
May
-
J. Nam, S. Cho, S. Kim, and D. Won, "Simple and efficient group key agreement based on factoring," in Proc. ICCSA (Part I), Int. Conf. Computational Science and Its Applications-Authentication Authorization Accounting (AAA) Workshop, May 2004, pp. 645-654.
-
(2004)
Proc. ICCSA (Part I), Int. Conf. Computational Science and Its Applications-Authentication Authorization Accounting (AAA) Workshop
, pp. 645-654
-
-
Nam, J.1
Cho, S.2
Kim, S.3
Won, D.4
-
23
-
-
77950189298
-
-
[Online]. Available
-
SCADA Applications Data Flow Systems. [Online]. Available: http:// www.dataflowsys.com/services/scada-applications.php
-
SCADA Applications Data Flow Systems
-
-
|