-
1
-
-
84868104508
-
Security challenges in next generation cyber physical systems
-
Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., Lee, I.: Security Challenges in Next Generation Cyber Physical Systems. In: Beyond SCADA: Cyber Physical Systems Meeting, HCSS-NEC4CPS (2006)
-
(2006)
Beyond SCADA: Cyber Physical Systems Meeting, HCSS-NEC4CPS
-
-
Anand, M.1
Cronin, E.2
Sherr, M.3
Blaze, M.4
Ives, Z.5
Lee, I.6
-
2
-
-
84893316353
-
Quantifying eavesdropping vulnerability in sensor networks
-
Anand, M., Ives, Z., Lee, I.: Quantifying Eavesdropping Vulnerability in Sensor Networks. In: 2nd VLDB Workshop on Data Management for Sensor Networks, DMSN (2005)
-
(2005)
2nd VLDB Workshop on Data Management for Sensor Networks, DMSN
-
-
Anand, M.1
Ives, Z.2
Lee, I.3
-
3
-
-
81855183282
-
Formal reasoning about physical properties of security protocols
-
Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning about Physical Properties of Security Protocols. ACM Transactions on Information and System Security (TISSEC) 14(2), 16 (2011)
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.2
, pp. 16
-
-
Basin, D.1
Capkun, S.2
Schaller, P.3
Schmidt, B.4
-
4
-
-
77956596618
-
Degrees of security: Protocol guarantees in the face of compromising adversaries
-
Dawar, A., Veith, H. (eds.), Springer, Heidelberg
-
Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol. 6247, pp. 1-18. Springer, Heidelberg (2010)
-
(2010)
CSL 2010. LNCS
, vol.6247
, pp. 1-18
-
-
Basin, D.1
Cremers, C.2
-
5
-
-
76549106506
-
Vulnerabilities and attacks in wireless sensor networks
-
Lopez, J., Zhou, J. (eds.). IOS Press
-
Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensors Networks Security. IOS Press (2007)
-
(2007)
Wireless Sensors Networks Security
-
-
Benenson, Z.1
Cholewinski, P.2
Freiling, F.3
-
6
-
-
84868094992
-
Presence, intervention, insertion: Unifying attack and failure models in wireless sensor networks
-
Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. Technical report, University of Mannheim (2009)
-
(2009)
Technical Report, University of Mannheim
-
-
Benenson, Z.1
Dewald, A.2
Freiling, F.3
-
7
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
8
-
-
17744379731
-
A calculus for control flow analysis of security protocols
-
Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security 2(3-4), 145-167 (2004)
-
(2004)
International Journal of Information Security
, vol.2
, Issue.3-4
, pp. 145-167
-
-
Buchholtz, M.1
Nielson, H.R.2
Nielson, F.3
-
10
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Cárdenas, A., Amin, S., Sastry, S.: Secure Control: Towards Survivable Cyber-Physical Systems. In: 28th International Conference on Distributed Computing Systems, ICDCS 2008 Workshops (2008)
-
(2008)
28th International Conference on Distributed Computing Systems, ICDCS 2008 Workshops
-
-
Cárdenas, A.1
Amin, S.2
Sastry, S.3
-
11
-
-
80055028776
-
Challenges for securing cyber physical systems
-
Cárdenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for Securing Cyber Physical Systems. In:Workshop on Future Directions in Cyberphysical Systems Security (2009)
-
(2009)
Workshop on Future Directions in Cyberphysical Systems Security
-
-
Cárdenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
-
12
-
-
84868091054
-
Toward a threat model for energy-harvesting wireless sensor networks
-
Benlamri, R. (ed.), Springer, Heidelberg
-
Di Mauro, A., Papini, D., Vigo, R., Dragoni, N.: Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol. 294, pp. 289-301. Springer, Heidelberg (2012)
-
(2012)
NDT 2012, Part II. CCIS
, vol.294
, pp. 289-301
-
-
Di Mauro, A.1
Papini, D.2
Vigo, R.3
Dragoni, N.4
-
13
-
-
0009768331
-
The Byzantine generals strike again
-
Dolev, D.: The Byzantine generals strike again. Journal of Algorithms 30, 14-30 (1982)
-
(1982)
Journal of Algorithms
, vol.30
, pp. 14-30
-
-
Dolev, D.1
-
17
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2) (1988)
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
20
-
-
84555177840
-
A survey of cyber physical systems
-
Shi, J., Wan, J., Yan, H., Suo, H.: A Survey of Cyber Physical Systems. In: International Conference on Wireless Communications and Signal Processing, WSCP 2011 (2011)
-
(2011)
International Conference on Wireless Communications and Signal Processing, WSCP 2011
-
-
Shi, J.1
Wan, J.2
Yan, H.3
Suo, H.4
|