-
2
-
-
0141945393
-
XML-signature syntax and processing
-
Eastlake, D., Reagle, J. and Solo, D. (Eds.), June
-
Bartel, M., Boyer, J., Fox, B., Lamacchia, B. and Simon, E. (2008) 'XML-signature syntax and processing', in Eastlake, D., Reagle, J. and Solo, D. (Eds.): W3C Recommendation, June.
-
(2008)
W3C Recommendation
-
-
Bartel, M.1
Boyer, J.2
Fox, B.3
Lamacchia, B.4
Simon, E.5
-
3
-
-
34247249787
-
-
RFC 4046
-
Baugher, M., Canetti, R., Dondeti, L. and Lindholm, F. (2005) Multicast Security (MSEC) Group Key Management Architecture, RFC 4046.
-
(2005)
Multicast Security (MSEC) Group Key Management Architecture
-
-
Baugher, M.1
Canetti, R.2
Dondeti, L.3
Lindholm, F.4
-
4
-
-
17844376972
-
-
RFC 3547, IETF, July
-
Baugher, M., Weis, B., Hardjono, T. and Harney, H. (2003) The Group Domain of Interpretation, RFC 3547, IETF, July.
-
(2003)
The Group Domain of Interpretation
-
-
Baugher, M.1
Weis, B.2
Hardjono, T.3
Harney, H.4
-
5
-
-
79954576480
-
An IPsec-based host architecture for secure internet multicast
-
San Diego, California, USA
-
Canetti, R., Chen Cheng, P., Giraud, F., Pendarakis, D., Rao, J.R., Rohatgi, P. and Saha, D. (2000) 'An IPsec-based host architecture for secure internet multicast', Proceedings of the 7th Annual Network and Distributed System Security Symposium, San Diego, California, USA, pp.23-39.
-
(2000)
Proceedings of the 7th Annual Network and Distributed System Security Symposium
, pp. 23-39
-
-
Canetti, R.1
Chen Cheng, P.2
Giraud, F.3
Pendarakis, D.4
Rao, J.R.5
Rohatgi, P.6
Saha, D.7
-
6
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
DOI 10.1145/1282380.1282382, ACM SIGCOMM 2007: Conference on Computer Communications
-
Casado, M., Freedman, M. J., Pettit, J., Luo, J., McKeown, N. and Shenker, S. (2007) 'Ethane: taking control of the enterprise', SIGCOMM'07, Kyoto, Japan, pp.1-12. (Pubitemid 350239768)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 1-12
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
Mckeown, N.5
Shenker, S.6
-
7
-
-
0004116989
-
-
3rd ed., The MIT Press
-
Cormen, T.H., Leiserson, C.E., Rivest, R.L. and Stein, C. (2002) Introduction to Algorithms, 3rd ed., The MIT Press.
-
(2002)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
9
-
-
79954597682
-
IEC61850 communication networks and systems in substations
-
IEC TC 57/WG 10-12, April
-
IEC TC 57/WG 10-12 (2003) 'IEC61850 communication networks and systems in substations', IEC International Standard 61850, April.
-
(2003)
IEC International Standard 61850
-
-
-
10
-
-
79954621071
-
Use of IEC 61850 for the communication between substations
-
IEC TC 57/WG 10, March
-
IEC TC 57/WG 10 (2010) 'Use Of IEC 61850 for the communication between substations', IEC Technical Report 61850-90-1 Ed. 1.0, March, pp.1-82.
-
(2010)
IEC Technical Report 61850-90-1 Ed. 1. 0
, pp. 1-82
-
-
-
11
-
-
79954622332
-
Power systems management and associated information exchange data and comm. security Part 6: Security for IEC 61850
-
IEC TC 57/WG 15, June
-
IEC TC 57/WG 15 (2007) 'Power systems management and associated information exchange data and comm. security Part 6: security for IEC 61850', IEC Technical Specification 62351-6 Ed. 1.0, June, pp.1-15.
-
(2007)
IEC Technical Specification 62351-6 Ed. 1.0
, pp. 1-15
-
-
-
12
-
-
33750405289
-
Security issues in SCADA networks
-
DOI 10.1016/j.cose.2006.03.001, PII S0167404806000514
-
Igure, V.M., Laughtera, S.A. and Williamsa, R.D. (2006) 'Security issues in SCADA networks', Computers & Security, Vol. 25, No. 7, pp.498-506. (Pubitemid 44637241)
-
(2006)
Computers and Security
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
13
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
ACM, Chicago, IL, USA
-
Liu, Y., Reiter, M.K. and Ning, P. (2009) 'False data injection attacks against state estimation in electric power grids', the 16th ACM Conference on Computer and Communications Security (CCS), ACM, Chicago, IL, USA, pp.21-32.
-
(2009)
The 16th ACM Conference on Computer and Communications Security (CCS)
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
14
-
-
85180537111
-
Efficient multicast packet authentication
-
San Diego, California, USA
-
Pannetrat, A. and Molva, R. (2003) 'Efficient multicast packet authentication', Network and Distributed System Security Symposium, San Diego, California, USA.
-
(2003)
Network and Distributed System Security Symposium
-
-
Pannetrat, A.1
Molva, R.2
-
15
-
-
0036079874
-
Efficient multicast packet authentication using signature amortization
-
Park, J.M., Chong, E.K. and Siegel, H.J. (2002) 'Efficient multicast packet authentication using signature amortization', Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, USA, pp.227-240. (Pubitemid 34648116)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 227-240
-
-
Park, J.M.1
Chong, E.K.P.2
Siegel, H.J.3
-
16
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Berkeley, California, USA
-
Perrig, A., Canetti, R., Tygar, J.D. and Song, D. (2000) 'Efficient authentication and signing of multicast streams over lossy channels', Proceedings of IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp.56-73.
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
17
-
-
84969790523
-
Substation automation high speed network communication platform based on MMS+TCP/IP+Ethernet
-
Ping Sun, J., Sheng, W., Wang, S. and Wu, K. (2002) 'Substation automation high speed network communication platform based on MMS+TCP/IP+Ethernet', International Conference on Power System Technology, Vol. 2, pp.1296-1300.
-
(2002)
International Conference on Power System Technology
, vol.2
, pp. 1296-1300
-
-
Ping Sun, J.1
Sheng, W.2
Wang, S.3
Wu, K.4
-
18
-
-
0036608768
-
Ethernet in substation automation
-
DOI 10.1109/MCS.2002.1003998
-
Skeie, T., Johannessen, S. and Brunner, C. (2002) 'Ethernet in substation automation', IEEE Control Systems Magazine, Vol. 22, No. 3, pp.43-51. (Pubitemid 34711476)
-
(2002)
IEEE Control Systems Magazine
, vol.22
, Issue.3
, pp. 43-51
-
-
Skeie T., S.T.1
-
19
-
-
70349172589
-
TVA investigates end-to-end integration
-
July
-
Smith, B.P. and Highfill, D.R. (2007) 'TVA investigates end-to-end integration', Transmission and Distribution World, VO. 59, No. 7, July, pp.20-26.
-
(2007)
Transmission and Distribution World
, vol.59
, Issue.7
, pp. 20-26
-
-
Smith, B.P.1
Highfill, D.R.2
-
20
-
-
84873419011
-
IEEE standard for local and metropolitan area networks-media access control (MAC) security
-
LAN/MAN Standards Committee of the IEEE Computer Society
-
LAN/MAN Standards Committee of the IEEE Computer Society (2006) 'IEEE standard for local and metropolitan area networks-media access control (MAC) security', IEEE Std 802.1AE-2006, pp.1-42.
-
(2006)
IEEE Std 802.1AE-2006
, pp. 1-42
-
-
-
21
-
-
79954590260
-
IEEE standard communication delivery time performance requirements for electric power substation automation
-
Substation Committee of the IEEE Power Engineering Society
-
Substation Committee of the IEEE Power Engineering Society (2005) 'IEEE standard communication delivery time performance requirements for electric power substation automation', IEEE Std 1646-2004, pp.1-24.
-
(2005)
IEEE Std 1646-2004
, pp. 1-24
-
-
-
22
-
-
79954572111
-
-
GAO Report to Congressional Requesters, US Government Accountability Office, September
-
Powner, D.A. and Rhodes, K.A. (2007) Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain, GAO Report to Congressional Requesters, US Government Accountability Office, September.
-
(2007)
Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are under Way, but Challenges Remain
-
-
Powner, D.A.1
Rhodes, K.A.2
-
23
-
-
70349653420
-
Time valid one-time signature for time-critical multicast data authentication
-
Rio de Janeiro, Brazil
-
Wang, Q., Khurana, H., Huang, Y. and Nahrstedt, K. (2009) 'Time valid one-time signature for time-critical multicast data authentication', IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, pp.1233-1241.
-
(2009)
IEEE Conference on Computer Communications (INFOCOM)
, pp. 1233-1241
-
-
Wang, Q.1
Khurana, H.2
Huang, Y.3
Nahrstedt, K.4
-
24
-
-
0032594123
-
Digital signatures for flows and multicasts
-
Wong, C.K. and Lam, S.S. (1999) 'Digital signatures for flows and multicasts', IEEE/ACM Trans. Netw., Vol. 7, No. 4, pp.502-513.
-
(1999)
IEEE/ACM Trans. Netw.
, vol.7
, Issue.4
, pp. 502-513
-
-
Wong, C.K.1
Lam, S.S.2
-
25
-
-
27744519064
-
Power system control centers: Past, present, and future
-
DOI 10.1109/JPROC.2005.857499
-
Wu, F.F., Mosleshi, K. and Bose, A. (2005) 'Power system control centers: past, present, and future', Proceedings of the IEEE, Vol. 93, No. 11, November, pp.1890-1908. (Pubitemid 41619230)
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.11
, pp. 1890-1908
-
-
Wu, F.F.1
Moslehi, K.2
Bose, A.3
-
26
-
-
82155198906
-
Application-aware secure multicast for power grid communications
-
IEEE Communications Society, Gaithersburg, Maryland
-
Zhang, J. and Gunter, C.A. (2010) 'Application-aware secure multicast for power grid communications', IEEE International Conference on Smart Grid Communications, IEEE Communications Society, Gaithersburg, Maryland.
-
(2010)
IEEE International Conference on Smart Grid Communications
-
-
Zhang, J.1
Gunter, C.A.2
-
27
-
-
82155198906
-
-
PhD Thesis, University of Illinois at Urbana-Champaign, Urbana, IL, USA
-
Zhang, J. (2010) Secure Multicast for Power Grid Communications, PhD Thesis, University of Illinois at Urbana-Champaign, Urbana, IL, USA.
-
(2010)
Secure Multicast for Power Grid Communications
-
-
Zhang, J.1
|