-
1
-
-
84858204063
-
Securing Scada Systems
-
(1st ed.) ISBN 0764597876
-
Ronald L. Krutz, Securing Scada Systems (1st ed.), John Wiley & Sons, 2005, ISBN 0764597876, 1-22.
-
(2005)
John Wiley & Sons
, pp. 1-22
-
-
Krutz, R.L.1
-
3
-
-
29944439716
-
-
Power system control & associated communications - Data & communication security, IEC62351 part 1 to 7, Technical Specification
-
IEC (International Electrotechnical Commission), Power system control & associated communications - Data & communication security, IEC62351 part 1 to 7, Technical Specification, 2007
-
(2007)
IEC., (International Electrotechnical Commission)
-
-
-
4
-
-
84889716238
-
-
IEEE (Institute of Electrical and Electronics Engineers), Trial Use Std. for Retrofit Cyber Security of Serial SCADA Links and IED Remote Access, P1689, Draft, 2007.
-
(2007)
IEEE., (Institute of Electrical and Electronics Engineers), Trial Use, Std., for Retrofit Cyber Security of Serial, SCADA., Links and, IED., Remote Access, P1689, Draft
-
-
-
6
-
-
84858253522
-
-
Proc. of the AISW-NetSec workshop, ACM
-
R. Dawson, C. Boyd, E. Dawson and JMG. Nieto, " SKMA, A Key Management Architecture for SCADA Systems" , Proc. of the AISW-NetSec workshop, ACM, 2006.
-
(2006)
SKMA A Key Management Architecture for SCADA Systems
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Nieto, J.M.G.4
-
8
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. Needham, M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers" Communications of the ACM, Vol. 21, pp. 993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
9
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
G. Lowe, " An attack on the Needham-Schroeder public key authentication protocol" , Information Processing Letters, vol. 56(3), pp. 131-136, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
10
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
B. C. Neuman, Theodore Ts'o, " Kerberos: An Authentication Service for Computer Networks" , IEEE Communications, volume 32/9, 33-38, 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Theodore, T.2
-
11
-
-
28144446331
-
-
RFC IETF 4120
-
C. Neuman, T. Yu, S. Hartman,, K. Raeburn, " The Kerberos Network Authentication Service (V5)" , RFC 4120, IETF, 2005.
-
(2005)
The Kerberos Network Authentication Service (V5)
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
13
-
-
84889697750
-
ITU., (International Telecommunication Union), " Information Technology - Open Systems Interconnection -The Directory: Authentication Framework" , ITU-T., Recommendation, X., 509
-
ITU (International Telecommunication Union), " Information Technology - Open Systems Interconnection -The Directory: Authentication Framework" , ITU-T Recommendation X.509, 2005.
-
(2005)
-
-
-
14
-
-
84889712471
-
-
I.E.T.F., PKIX., Charter Requests For Comments (RFCs)
-
IETF, PKIX Charter Requests For Comments (RFCs), http://www.ietf.org/html.charters/pkix-charter.html
-
-
-
-
15
-
-
84889751050
-
-
X509 Style Guide, October
-
P. Gutmann, X509 Style Guide, October 2000, http://www.cs.auckland.ac.nz/~pgut001/
-
(2000)
-
-
Gutmann, P.1
-
16
-
-
2542521157
-
-
(1st ed.), WileyISBN 0471223573
-
N. Ferguson, B. Schneier, Practical Cryptography (1st ed.), Wiley, ISBN 0471223573, pp. 315-345, 2003.
-
(2003)
Practical Cryptography
, pp. 315-345
-
-
Ferguson, N.1
Schneier, B.2
-
17
-
-
84889695385
-
-
Everything you never wanted to know about PKI but have been forced to find out
-
P. Gutmann, "Everything you never wanted to know about PKI but have been forced to find out", 2001, http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf
-
(2001)
-
-
Gutmann, P.1
-
20
-
-
84889720809
-
DNP., User Group, Secure DNP3 specifications, DNP., User Group Library
-
DNP User Group, Secure DNP3 specifications, DNP User Group Library (www.dnp.org), 2007.
-
(2007)
-
-
-
24
-
-
17744384943
-
-
Technical Report SAND2001-3252 Sandia National Laboratories
-
C. Beaver, D. Gallup, W. Neumann & Torgerson M., " Key management for SCADA" , Technical Report SAND2001-3252, Sandia National Laboratories, 2002.
-
(2002)
Key management for SCADA
-
-
Beaver, C.1
Gallup, D.2
Neumann, W.3
Torgerson, M.4
-
25
-
-
33845929407
-
-
, NETL Project M63SNL34 Final Report
-
D. Holstein, J. Tengdin, J. Wack, R. Butler, T. Draelos, P. Blomgren, Cyber Security for Utility Operations, NETL Project M63SNL34, Final Report, 2005.
-
(2005)
Cyber Security for Utility Operations
-
-
Holstein, D.1
Tengdin, J.2
Wack, J.3
Butler, R.4
Draelos, T.5
Blomgren, P.6
-
28
-
-
84889756249
-
-
ECRYPT (European Network of Excellence in Cryptology), ECRYPT Yearly Report on Algorithms and Keysizes (D.SPA.10), ECRYPT IST European Project, 2005.
-
(2005)
ECRYPT., (European Network of Excellence in Cryptology), ECRYPT., Yearly Report on Algorithms and Keysizes, (D.SPA., 10), ECRYPT., IST., European Project
-
-
-
29
-
-
84948990367
-
How to Explain Zero-Knowledge Protocols to Your Children
-
Jean-Jacques Quisquater, Louis C. Guillou, Thomas A. Berson, " How to Explain Zero-Knowledge Protocols to Your Children" , Proc. of Crypto '89, Springer, 628-631, 1990.
-
(1990)
Proc. of Crypto '89, Springer
, pp. 628-631
-
-
Quisquater, J.-J.1
Guillou, L.C.2
Berson, T.A.3
-
32
-
-
0037056208
-
Achievement of secure Internet access to fieldbus systems
-
T. Sauter and Ch. Schwaiger, " Achievement of secure Internet access to fieldbus systems" , Microprocessors and Microsystems Journal, Elsevier, Vol. 26, Issue 7, 2002.
-
(2002)
Microprocessors and Microsystems Journal Elsevier
, vol.26
, Issue.7
-
-
Sauter, T.1
Schwaiger, Ch.2
-
34
-
-
27744579515
-
Implications of power-line communication on distributed data acquisition and control systems
-
M. Lobashov, G. Pratl, and T. Sauter, " Implications of power-line communication on distributed data acquisition and control systems" , in Proc. International IEEE Conference Emerging Technologies and Factory Automation 2003 (ETFA'03), vol. 2, 607-613, 2003.
-
(2003)
Proc International IEEE Conference Emerging Technologies and Factory Automation 2003 (ETFA'03)
, vol.2
, pp. 607-613
-
-
Lobashov, M.1
Pratl, G.2
Sauter, T.3
-
35
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J. Tygar & D. Song, " Efficient authentication and signing of multicast streams over lossy channels" , Proc. of the IEEE S&P Symp., IEEE CS, 2000.
-
(2000)
Proc. of the IEEE S&P Symp., IEEE CS
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
36
-
-
51349086981
-
sSCADA: Securing SCADA Infrastructure Communications
-
Y. Wang, B. Chu, " sSCADA: Securing SCADA Infrastructure Communications" , IACR Eprint, 2004.
-
(2004)
IACR Eprint
-
-
Wang, Y.1
Chu, B.2
-
37
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. Tygar, " Spins: Security protocols for sensor networks" , Wireless Networks Journal (WINE), September 2002.
-
(2002)
Wireless Networks Journal (WINE)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
38
-
-
51349098629
-
Identity-Based Key Agreement and Encryption for Wireless Sensor Networks
-
G. Yang, C. Rong, C. Veigner, J. Wang, and H. Cheng, " Identity-Based Key Agreement and Encryption for Wireless Sensor Networks" , IJCSNS International Journal of Computer Science and Network Security, Vol.6 No.5B, 2006.
-
(2006)
IJCSNS International Journal of Computer Science and Network Security
, vol.6 No
, Issue.5 B
-
-
Yang, G.1
Rong, C.2
Veigner, C.3
Wang, J.4
Cheng, H.5
-
40
-
-
34250659309
-
Key management for long-lived sensor networks in hostile environments
-
M. Chorzempa, J-M. Park, M.Eltoweissy, " Key management for long-lived sensor networks in hostile environments" , ACM Computer Communications, Volume 30, Issue 9, 1964-1979, 2007.
-
(2007)
ACM Computer Communications
, vol.30
, Issue.9
, pp. 1964-1979
-
-
Chorzempa, M.1
Park, J.-M.2
Eltoweissy, M.3
-
42
-
-
51249195966
-
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
-
Springer
-
C. Alcaraz & R. Roman, " Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios" , Proceedings of CRITIS'06 Conference, Springer, 2006.
-
(2006)
Proceedings of CRITIS'06 Conference
-
-
Alcaraz, C.1
Roman, R.2
|