|
Volumn , Issue , 2008, Pages
|
Applying security algorithms against cyber attacks in the distribution automation system
|
Author keywords
Cyber attack; Distribution automation; Distribution network security; Key distribution; Message authentication code; Security algorithm
|
Indexed keywords
CYBER-ATTACKS;
DISTRIBUTION AUTOMATION;
DISTRIBUTION NETWORK;
MESSAGE AUTHENTICATION CODES;
SECURITY KEY;
ALGORITHMS;
AUTHENTICATION;
AUTOMATION;
CHANNEL CAPACITY;
COMPUTATION THEORY;
COMPUTATIONAL EFFICIENCY;
COMPUTER CRIME;
CRIME;
DISTRIBUTED PARAMETER NETWORKS;
ELECTRIC POWER SYSTEMS;
NETWORK PROTOCOLS;
PUBLIC KEY CRYPTOGRAPHY;
SCADA SYSTEMS;
NETWORK SECURITY;
|
EID: 77950970223
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/TDC.2008.4517289 Document Type: Conference Paper |
Times cited : (10)
|
References (16)
|