-
1
-
-
35048833887
-
A structured operational modelling of the dolev-yao threat model
-
Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. Springer, Heidelberg
-
Mao, W.: A structured operational modelling of the dolev-yao threat model. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 34-46. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2845
, pp. 34-46
-
-
Mao, W.1
-
2
-
-
77956569636
-
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
-
ePrint Archive, Report 2009/079
-
Basin, D., Cremers, C.: From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. Cryptology ePrint Archive, Report 2009/079 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology
-
-
Basin, D.1
Cremers, C.2
-
3
-
-
18044369652
-
Process Algebra for Hybrid Systems
-
Bergstra, J.A., Middleburg, C.A.: Process Algebra for Hybrid Systems. Theor. Comput. Sci. 335(2-3), 215-280 (2005)
-
(2005)
Theor. Comput. Sci.
, vol.335
, Issue.2-3
, pp. 215-280
-
-
Bergstra, J.A.1
Middleburg, C.A.2
-
4
-
-
67650535901
-
Rethinking Security Properties, Threat Models, and the Design Space in Sensor Networks: A Case Study in Scada Systems
-
Cardenas, A.A., Roosta, T., Sastry, S.: Rethinking Security Properties, Threat Models, and the Design Space in Sensor Networks: A Case Study in Scada Systems. Ad Hoc Netw. 7(8), 1434-1447 (2009)
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.8
, pp. 1434-1447
-
-
Cardenas, A.A.1
Roosta, T.2
Sastry, S.3
-
5
-
-
84872800478
-
SKMA: A Key Management Architecture for SCADA Systems
-
Australian Computer Society, Inc., Darlinghurst
-
Dawson, R., Boyd, C., Dawson, E., Nieto, J.M.G.: SKMA: A Key Management Architecture for SCADA Systems. In: ACSW Frontiers 2006: Proceedings of the 2006 Australasian Workshops on Grid Computing and e-Research, pp. 183-192. Australian Computer Society, Inc., Darlinghurst (2006)
-
(2006)
ACSW Frontiers 2006: Proceedings of the 2006 Australasian Workshops on Grid Computing and E-Research
, pp. 183-192
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Nieto, J.M.G.4
-
6
-
-
0019649307
-
On the Security of Public Key Protocols
-
IEEE Computer Society, Washington, DC
-
Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. In: SFCS 1981: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science, pp. 350-357. IEEE Computer Society, Washington, DC (1981)
-
(1981)
SFCS 1981: Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
, pp. 350-357
-
-
Dolev, D.1
Yao, A.C.2
-
7
-
-
0027561446
-
A Plant-Wide Industrial Process Control Problem
-
Downs, J.J., Vogel, E.F.: A Plant-Wide Industrial Process Control Problem. Computers & Chemical Engineering 17(3), 245-255 (1993)
-
(1993)
Computers & Chemical Engineering
, vol.17
, Issue.3
, pp. 245-255
-
-
Downs, J.J.1
Vogel, E.F.2
-
8
-
-
84857378372
-
Safeguarding Critical Infrastructures
-
Wiley[Imprint], Inc., Chichester
-
Gamez, D., Nadjm-tehrani, S., Bigham, J., Balducelli, C., Burbeck, K., Chyssler, T.: Safeguarding Critical Infrastructures. In: DEPENDABLE COMPUTING SYSTEMS: Paradigms, Performance Issues, and Applications, Wiley[Imprint], Inc., Chichester (2000)
-
(2000)
Dependable Computing Systems: Paradigms, Performance Issues, and Applications
-
-
Gamez, D.1
Nadjm-tehrani, S.2
Bigham, J.3
Balducelli, C.4
Burbeck, K.5
Chyssler, T.6
-
11
-
-
47149112288
-
Context Information-based Cyber Security Defense of Protection System
-
Sheng, S., Chan, W.L., Li, K.K., Xianzhong, D., Xiangjun, Z.: Context Information-based Cyber Security Defense of Protection System. IEEE Transactions on Power Delivery 22(3), 1477-1481 (2007)
-
(2007)
IEEE Transactions on Power Delivery
, vol.22
, Issue.3
, pp. 1477-1481
-
-
Sheng, S.1
Chan, W.L.2
Li, K.K.3
Xianzhong, D.4
Xiangjun, Z.5
-
13
-
-
50649107305
-
Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)
-
Verba, M., Milvich, J.: Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS). In: IEEE Conference on Technologies for Homeland Security, pp. 469-473 (2008)
-
(2008)
IEEE Conference on Technologies for Homeland Security
, pp. 469-473
-
-
Verba, M.1
Milvich, J.2
|