-
1
-
-
17744384943
-
Key management for SCADA
-
Sandia National Laboratories - Cryptography and Information Systems Surety Department March
-
Beaver, C., Gallup, D., Neumann, W., Torgerson, M.: Key management for SCADA. Technical Report SAND2001-3252, Sandia National Laboratories - Cryptography and Information Systems Surety Department (March 2002)
-
(2002)
Technical Report SAND2001-3252
-
-
Beaver, C.1
Gallup, D.2
Neumann, W.3
Torgerson, M.4
-
2
-
-
84872800478
-
SKMA: A key management architecture for SCADA systems
-
Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.). Australian Computer Society
-
Dawson, R., Boyd, C., Dawson, E., González Nieto, J.M.: SKMA: a key management architecture for SCADA systems. In: Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) ACSW Frontiers. CRPIT, vol. 54, pp. 183-192. Australian Computer Society (2006)
-
(2006)
ACSW Frontiers. CRPIT
, vol.54
, pp. 183-192
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
González Nieto, J.M.4
-
3
-
-
84969368443
-
An identity-based key-exchange protocol
-
Quisquater, J.-J., Vandewalle, J. (eds.). Springer, Heidelberg
-
Günther, C.G.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29-37. Springer, Heidelberg (1990)
-
(1990)
EUROCRYPT 1989. LNCS
, vol.434
, pp. 29-37
-
-
Günther, C.G.1
-
4
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
University of Colorado at Boulder - Department of Computer Science January
-
Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, University of Colorado at Boulder - Department of Computer Science (January 2005)
-
(2005)
Technical Report CU-CS-990-05
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
5
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3), 293-315 (2003) (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
6
-
-
38349039331
-
Forward-secure key evolution in wireless sensor networks
-
Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.). Springer, Heidelberg
-
Klonowski, M., Kutylowski, M., Ren, M., Rybarczyk, K.: Forward-secure key evolution in wireless sensor networks. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 102-120. Springer, Heidelberg (2007)
-
(2007)
CANS 2007. LNCS
, vol.4856
, pp. 102-120
-
-
Klonowski, M.1
Kutylowski, M.2
Ren, M.3
Rybarczyk, K.4
-
7
-
-
0019634370
-
Password authentification with insecure communication
-
Lamport, L.: Password authentification with insecure communication. Commun. ACM 24(11), 770-772 (1981)
-
(1981)
Commun ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
8
-
-
33745850722
-
Forward secure communication in wireless sensor networks
-
DOI 10.1007/11734666-4, Security in Pervasive Computing - Third International Conference, SPC 2006, Proceedings
-
Mauw, S., van Vessem, I., Bos, B.: Forward secure communication in wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 32-42. Springer, Heidelberg (2006) (Pubitemid 44029556)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3934
, pp. 32-42
-
-
Mauw, S.1
Van Vessem, I.2
Bos, B.3
-
9
-
-
0037377597
-
SCADA and IP: Is network convergence really here?
-
McClanahan, R.: SCADA and IP: is network convergence really here? IEEE Industry Applications Magazine 9(2), 29-36 (2003)
-
(2003)
IEEE Industry Applications Magazine
, vol.9
, Issue.2
, pp. 29-36
-
-
McClanahan, R.1
-
10
-
-
56749175324
-
Key management and secure software updates in wireless process control environments
-
Gligor, V.D., Hubaux, J.-P., Poovendran, R. (eds.). ACM, New York
-
Nilsson, D.K., Roosta, T., Lindqvist, U., Valdes, A.: Key management and secure software updates in wireless process control environments. In: Gligor, V.D., Hubaux, J.-P., Poovendran, R. (eds.)WISEC, pp. 100-108. ACM, New York (2008)
-
(2008)
WISEC
, pp. 100-108
-
-
Nilsson, D.K.1
Roosta, T.2
Lindqvist, U.3
Valdes, A.4
-
13
-
-
33750241979
-
Diverging keys in wireless sensor networks
-
Information Security - 9th International Conference, ISC 2006, Proceedings
-
Ren, M., Das, T.K., Zhou, J.: Diverging keys in wireless sensor networks. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 257-269. Springer, Heidelberg (2006) (Pubitemid 44609952)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4176
, pp. 257-269
-
-
Ren, M.1
Das, T.K.2
Zhou, J.3
-
14
-
-
34249727108
-
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection
-
DOI 10.1016/j.istr.2007.02.003, PII S1363412707000052
-
Roman, R., Alcaraz, C., Lopez, J.: The role of wireless sensor networks in the area of critical information infrastructure protection. Information Security Technical Report 12(1), 24-31 (2007) (Pubitemid 46829995)
-
(2007)
Information Security Technical Report
, vol.12
, Issue.1
, pp. 24-31
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
-
15
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Verdone, R. (ed.). Springer, Heidelberg
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
(2008)
EWSN 2008. LNCS
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
16
-
-
84938685054
-
-
September 2003
-
Vieiral, M.A.M., Coelho Jr., C.N., Cecilio da Silva Junio, D., da Mata, J.M.: Survey on wireless sensor network devices, September 2003, vol. 1, pp. 537-544 (2003)
-
(2003)
Survey on Wireless Sensor Network Devices
, vol.1
, pp. 537-544
-
-
Vieiral, M.A.M.1
Coelho Jr., C.N.2
Cecilio Da Silva Jr., D.3
Da Mata, J.M.4
-
17
-
-
35348910049
-
Security in distributed, grid, and pervasive computing
-
Xiao, Y. (ed.), ch. 17. Auerbach Publications, CRC Press
-
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Security in Distributed, Grid, and Pervasive Computing. In: Xiao, Y. (ed.) Wireless sensor network security: A survey, ch. 17. Auerbach Publications, CRC Press (2006)
-
(2006)
Wireless Sensor Network Security: A Survey
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
|