메뉴 건너뛰기




Volumn 7613 LNCS, Issue , 2012, Pages 347-356

The cyber-physical attacker

Author keywords

attacker model; cyber physical systems; cyber physical threats; security protocol verification

Indexed keywords

CYBER PHYSICAL SYSTEMS (CPSS); CYBER-PHYSICAL THREATS; SECURITY PROPERTIES; SECURITY PROTOCOL VERIFICATION; SECURITY PROTOCOLS;

EID: 84868144325     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33675-1_31     Document Type: Conference Paper
Times cited : (14)

References (21)
  • 4
    • 77956596618 scopus 로고    scopus 로고
    • Degrees of security: Protocol guarantees in the face of compromising adversaries
    • Dawar, A., Veith, H. (eds.), Springer, Heidelberg
    • Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol. 6247, pp. 1-18. Springer, Heidelberg (2010)
    • (2010) CSL 2010. LNCS , vol.6247 , pp. 1-18
    • Basin, D.1    Cremers, C.2
  • 5
    • 76549106506 scopus 로고    scopus 로고
    • Vulnerabilities and attacks in wireless sensor networks
    • Lopez, J., Zhou, J. (eds.). IOS Press
    • Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensors Networks Security. IOS Press (2007)
    • (2007) Wireless Sensors Networks Security
    • Benenson, Z.1    Cholewinski, P.2    Freiling, F.3
  • 6
    • 84868094992 scopus 로고    scopus 로고
    • Presence, intervention, insertion: Unifying attack and failure models in wireless sensor networks
    • Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. Technical report, University of Mannheim (2009)
    • (2009) Technical Report, University of Mannheim
    • Benenson, Z.1    Dewald, A.2    Freiling, F.3
  • 7
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 12
    • 84868091054 scopus 로고    scopus 로고
    • Toward a threat model for energy-harvesting wireless sensor networks
    • Benlamri, R. (ed.), Springer, Heidelberg
    • Di Mauro, A., Papini, D., Vigo, R., Dragoni, N.: Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol. 294, pp. 289-301. Springer, Heidelberg (2012)
    • (2012) NDT 2012, Part II. CCIS , vol.294 , pp. 289-301
    • Di Mauro, A.1    Papini, D.2    Vigo, R.3    Dragoni, N.4
  • 13
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • Dolev, D.: The Byzantine generals strike again. Journal of Algorithms 30, 14-30 (1982)
    • (1982) Journal of Algorithms , vol.30 , pp. 14-30
    • Dolev, D.1
  • 17
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2) (1988)
    • (1988) SIAM J. Comput. , vol.17 , Issue.2
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.