-
1
-
-
84860878484
-
-
http://www.nist.gov/smartgrid/
-
-
-
-
2
-
-
84860878855
-
-
http://www.zigbee.org/
-
-
-
-
3
-
-
72449191827
-
NIST Framework and Roadmap for Smart Grid Interoperability
-
Release 1.0, Jan.
-
NIST Framework and Roadmap for Smart Grid Interoperability. NIST Special Publication 1108. Release 1.0, Jan., 2010
-
(2010)
NIST Special Publication 1108
-
-
-
4
-
-
84860845322
-
-
SG security working group (UCAIug) and NIST Cyber Security Coordination Task Group, version 1.0, Dec. 10
-
SG security working group (UCAIug) and NIST Cyber Security Coordination Task Group, "Security Profile for Advanced Metering Infrastructure," version 1.0, Dec. 10, 2009.
-
(2009)
Security Profile for Advanced Metering Infrastructure
-
-
-
5
-
-
79954605963
-
Smart Grid Cyber Security Strategy, Architecture, and High-level Requirements
-
NISTIR 7628, NIST
-
Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-level Requirements, NISTIR 7628, NIST, 2010.
-
(2010)
Guidelines for Smart Grid Cyber Security
, vol.1
-
-
-
6
-
-
79956072480
-
California Smart Grid Attributes: California Public Utility Commission Metrics
-
April
-
K. Yagnik, S. Vadhva, R. Tatro and M. Vaziri, "California Smart Grid Attributes: California Public Utility Commission Metrics," IEEE-Green, pp. 1-6, April 2011.
-
(2011)
IEEE-Green
, pp. 1-6
-
-
Yagnik, K.1
Vadhva, S.2
Tatro, R.3
Vaziri, M.4
-
10
-
-
67650822699
-
Security and Privacy Challenges in the Smart Grid
-
May/June
-
P. Mcdaniel and S. Mclaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security & Privacy, vol. 7 no. 3, pp. 75-77, May/June 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
Mcdaniel, P.1
Mclaughlin, S.2
-
11
-
-
77952113745
-
An Integrated Security System of Protecting Smart Grid against Cyber Attacks
-
D. Wei, Y. Lu, M. Jafari, P. Skare, and K. Rohde, "An Integrated Security System of Protecting Smart Grid against Cyber Attacks," in Proc. 2010 IEEE PES Conf. on Innovative Smart Grid Technologies (ISGT), pp, 1-7.
-
Proc. 2010 IEEE PES Conf. on Innovative Smart Grid Technologies (ISGT)
, pp. 1-7
-
-
Wei, D.1
Lu, Y.2
Jafari, M.3
Skare, P.4
Rohde, K.5
-
13
-
-
77952887452
-
Security Technology for Smart Grid Networks
-
June
-
A. R. Metke and R. L. Ekl, "Security Technology for Smart Grid Networks," IEEE Trans. On Smart Grid, vol. 1, no. 1, pp. 99-107, June 2010.
-
(2010)
IEEE Trans. On Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
14
-
-
77956607253
-
Opportunities and Challenges of Wireless Sensor Networks in Smart Grid
-
Oct.
-
V. C. Gungor, B. Lu, and G. P. Hancke, "Opportunities and Challenges of Wireless Sensor Networks in Smart Grid," IEEE Tran. On Industrial Electronics, vol 57, no 10, pp. 3557-3564, Oct. 2010.
-
(2010)
IEEE Tran. On Industrial Electronics
, vol.57
, Issue.10
, pp. 3557-3564
-
-
Gungor, V.C.1
Lu, B.2
Hancke, G.P.3
-
15
-
-
79957773391
-
Fault-Tolerant and Scalable Key Management for Smart Grid
-
June
-
D. Wu and C. Zhou, "Fault-Tolerant and Scalable Key Management for Smart Grid", IEEE Trans. On Smart Grid, vol. 2, no. 2, pp. 375-381, June 2010.
-
(2010)
IEEE Trans. On Smart Grid
, vol.2
, Issue.2
, pp. 375-381
-
-
Wu, D.1
Zhou, C.2
-
17
-
-
82155177539
-
Secure Lossless Aggregation for Smart Grid M2M Networks
-
A. Bartoli, J. Hernandez-Serrano, M. Soriano, M. Dohler, A. Kountouris and D. Barthel, "Secure Lossless Aggregation for Smart Grid M2M Networks," in Proc. 2010 IEEE Conf. Smart Grid Communication, pp, 333-338.
-
Proc. 2010 IEEE Conf. Smart Grid Communication
, pp. 333-338
-
-
Bartoli, A.1
Hernandez-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
20
-
-
78751679824
-
Enhanced Security Protocols for EPC Global Gen2 on Smart Grid Network
-
J. Cho, M. Chung, K. Choi, Y. Lee, and J. Moon, "Enhanced Security Protocols for EPC Global Gen2 on Smart Grid Network," in Proc. 2010 Inter. Conf. Ubiquitous Info. Technologies and Applications. pp. 1-5.
-
Proc. 2010 Inter. Conf. Ubiquitous Info. Technologies and Applications
, pp. 1-5
-
-
Cho, J.1
Chung, M.2
Choi, K.3
Lee, Y.4
Moon, J.5
-
22
-
-
77951737703
-
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
-
H. Khurana, R. Bobba, T. Yardley, P. Agarwal and E. Heine, "Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols," in Proc. 2010 43rd Hawaii International Conference on System Sciences, pp.1-10.
-
Proc. 2010 43rd Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Khurana, H.1
Bobba, R.2
Yardley, T.3
Agarwal, P.4
Heine, E.5
-
23
-
-
67249083071
-
A Tree-Based Signature Scheme for VANETs
-
Y. Jiang, M. Shi, X. Shen, and C. Lin, "A Tree-Based Signature Scheme for VANETs," in Proc. 2008 IEEE GLOBECOM, pp. 1-5.
-
Proc. 2008 IEEE GLOBECOM
, pp. 1-5
-
-
Jiang, Y.1
Shi, M.2
Shen, X.3
Lin, C.4
-
24
-
-
11744310046
-
Batch Verifying Multiple RSA Digital Signatures
-
June
-
L. Harn, "Batch Verifying Multiple RSA Digital Signatures," IEE Electronic Letters, vol 34, no. 12, pp. 1219-1220, June 1998.
-
(1998)
IEE Electronic Letters
, vol.34
, Issue.12
, pp. 1219-1220
-
-
Harn, L.1
-
25
-
-
1542625909
-
Efficient Multicast Stream Authentication Using Erasure Codes
-
May
-
J. M. Park, E. K. P. Park, and H. J. Siegel, "Efficient Multicast Stream Authentication Using Erasure Codes," ACM Trans. On Information and System Security, vol 6, no.2, pp. 258-285, May 2003.
-
(2003)
ACM Trans. On Information and System Security
, vol.6
, Issue.2
, pp. 258-285
-
-
Park, J.M.1
Park, E.K.P.2
Siegel, H.J.3
-
26
-
-
24944508408
-
Distillation Codes and Applications to DoS Resistant Multicast Authentication
-
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J.D. Tygar, "Distillation Codes and Applications to DoS Resistant Multicast Authentication," in Proc. 2004 Ann. Network and Distribut. Sys. Security Symp., pp. 37-56.
-
Proc. 2004 Ann. Network and Distribut. Sys. Security Symp.
, pp. 37-56
-
-
Karlof, C.1
Sastry, N.2
Li, Y.3
Perrig, A.4
Tygar, J.D.5
-
27
-
-
23044435711
-
Short Signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil pairing," Journal of Cryptology, vol 17. No. 4, pp.297-319, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
28
-
-
84874324906
-
Identity-based encryption from Weil pairing
-
Proc. of Crypto
-
D. Boneh and M. Franklin, "Identity-based encryption from Weil pairing," in Proc. of Crypto, LNCS 2001, vol. 2139, pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
29
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Advances in Cryptology, EUROCRYPT 2003
-
D. Boneh, C. Gentry, B. Lynn and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," Advances in Cryptology, EUROCRYPT 2003, LNCS, Volume 2656. pp. 416-432.
-
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
30
-
-
23044435243
-
Efficient implementations for Pairing-based Cryptography
-
P. Barreto, B. Lynn and M. Scott, "Efficient implementations for Pairing-based Cryptography," Journal of Cryptology, vol 17, no. 4, pp.321-334, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 321-334
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
32
-
-
0002579339
-
Sensitivity Analysis of Minimum Spanning Trees and Shortest Path Trees
-
R. E. Tarjan, "Sensitivity Analysis of Minimum Spanning Trees and Shortest Path Trees," Info. Proc. Lett. vol. 14, no. 1, pp. 30-33. 1982.
-
(1982)
Info. Proc. Lett.
, vol.14
, Issue.1
, pp. 30-33
-
-
Tarjan, R.E.1
-
33
-
-
84860871359
-
Further Improvement and Vulnerability for Fast Encryption for Multimedia
-
Sep.
-
D. Li and S. Sampalli, "Further Improvement and Vulnerability for Fast Encryption for Multimedia," International Journal of Network Security, vol.7, no.2, pp.188-193, Sep. 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 188-193
-
-
Li, D.1
Sampalli, S.2
-
34
-
-
56749137665
-
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
-
D. Li and S. Sampalli, "A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying," International Journal of Network Security, vol. 6, no. 3, pp. 270-281, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.3
, pp. 270-281
-
-
Li, D.1
Sampalli, S.2
-
35
-
-
84860858098
-
-
http://www.isi.edu/nsnam/ns
-
-
-
|