메뉴 건너뛰기




Volumn 26, Issue 4, 2011, Pages 2370-2379

A secure smart-metering protocol over power-line communication

Author keywords

Power line communication (PLC); security; smart metering

Indexed keywords

APPROPRIATE TECHNOLOGIES; CERTIFICATE AUTHORITY; COMMUNICATION LINES; DENIAL OF SERVICE ATTACKS; ELECTRICAL OUTLETS; HOP BY HOP; KEY MATERIALS; MEASURING DEVICE; METER READINGS; PLC NETWORKS; POWER CORDS; POWER LINES; POWER-LINE COMMUNICATIONS; SECRET SHARING; SECURE TRANSMISSION; SECURITY; SINGLE POINT; SMART GRID; SMART METERING; STRONG AUTHENTICATION; TERMINAL NODES; WATER CONSUMPTION;

EID: 80054052519     PISSN: 08858977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPWRD.2011.2158671     Document Type: Article
Times cited : (51)

References (16)
  • 1
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition, paradigm
    • Sep.
    • M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition, paradigm," J. Cryptol., vol. 21, no. 4, pp. 469-491, Sep. 2008.
    • (2008) J. Cryptol. , vol.21 , Issue.4 , pp. 469-491
    • Bellare, M.1    Namprempre, C.2
  • 2
    • 35048826242 scopus 로고    scopus 로고
    • The EAX mode of operation
    • Feb. Lecture Notes Comput. Sci.
    • M. Bellare, P. Rogaway, and D. Wagner, "The EAX mode of operation," in Proc. Fast Software Encryption, Feb. 2004, vol. 3017, Lecture Notes Comput. Sci., pp. 389-407.
    • (2004) Proc. Fast Software Encryption , vol.3017 , pp. 389-407
    • Bellare, M.1    Rogaway, P.2    Wagner, D.3
  • 3
    • 0028462933 scopus 로고
    • Threshold cryptography
    • Jul.
    • Y. Desmest, "Threshold cryptography," Eur. Trans. Telecommun., vol. 5, no. 4, pp. 449-457, Jul. 1994.
    • (1994) Eur. Trans. Telecommun. , vol.5 , Issue.4 , pp. 449-457
    • Desmest, Y.1
  • 4
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen message attacks
    • Apr.
    • S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen message attacks," SIAM J. Comput., vol. 17, no. 2, pp. 281-308, Apr. 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 5
    • 35048856034 scopus 로고    scopus 로고
    • CWC: A high-performance conventional authenticated encryption mode
    • Feb. Lecture Notes Comput. Sci.
    • T. Kohno, J. Viega, and D. Whiting, "CWC: A high-performance conventional authenticated encryption mode," in Proc. Fast Software Encryption, Feb. 2004, vol. 3017, Lecture Notes Comput. Sci., pp. 408-426.
    • (2004) Proc. Fast Software Encryption , vol.3017 , pp. 408-426
    • Kohno, T.1    Viega, J.2    Whiting, D.3
  • 6
    • 84865516697 scopus 로고    scopus 로고
    • The security and performance of the Galois/Counter Mode (GCM) of operation
    • Dec. Lecture Notes Comput. Sci.
    • D. McGrew and J. Viega, "The security and performance of the Galois/Counter Mode (GCM) of operation," in Proc. Progr. Cryptol., Dec. 2004, vol. 3348, Lecture Notes Comput. Sci., pp. 377-413.
    • (2004) Proc. Progr. Cryptol. , vol.3348 , pp. 377-413
    • McGrew, D.1    Viega, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.