-
2
-
-
79960582040
-
-
IETF, RFC 5905
-
D. Mills, U. Delaware, J. Martin, J. Burbank, W. Kasch, "Network Time Protocol Version 4: Protocol and Algorithms Specification", IETF, RFC 5905, 2010.
-
(2010)
Network Time Protocol Version 4: Protocol and Algorithms Specification
-
-
Mills, D.1
Delaware, U.2
Martin, J.3
Burbank, J.4
Kasch, W.5
-
3
-
-
47949116231
-
Traps and pitfalls in secure clock synchronization
-
A. Treytl, G. Gaderer, B. Hirschler and R. Cohen, "Traps and pitfalls in secure clock synchronization", International Symposium for Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2007, pp. 18-24, 2007.
-
(2007)
International Symposium for Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2007
, pp. 18-24
-
-
Treytl, A.1
Gaderer, G.2
Hirschler, B.3
Cohen, R.4
-
4
-
-
71949114351
-
Delay Attacks - Implication on NTP and PTP Time Synchronization
-
M. Ullmann, M. Vogeler, "Delay Attacks - Implication on NTP and PTP Time Synchronization", International Symposium for Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2009, pp. 1-6, 2009.
-
(2009)
International Symposium for Precision Clock Synchronization for Measurement, Control and Communication, ISPCS 2009
, pp. 1-6
-
-
Ullmann, M.1
Vogeler, M.2
-
5
-
-
49449093129
-
Secure Time Synchronization in Sensor Networks
-
July
-
S. Ganeriwal, C. Popper, S. Capkun,, M. B. Srivastava, "Secure Time Synchronization in Sensor Networks", ACM Trans. Info. and Sys. Sec., Volume 11, Issue 4, July 2008.
-
(2008)
ACM Trans. Info. and Sys. Sec.
, vol.11
, Issue.4
-
-
Ganeriwal, S.1
Popper, C.2
Capkun, S.3
Srivastava, M.B.4
-
6
-
-
82855182120
-
Time synchronization security using IPsec and MACsec
-
T. Mizrahi, "Time synchronization security using IPsec and MACsec", in Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS, pp. 38-43, 2011.
-
(2011)
Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS
, pp. 38-43
-
-
Mizrahi, T.1
-
7
-
-
70349839517
-
Strategies to secure the IEEE 1588 protocol in digital substation automation
-
J.-C. Tournier, O. Goerlitz, "Strategies to secure the IEEE 1588 protocol in digital substation automation", Fourth International Conference on Critical Infrastructures, CRIS 2009, pp. 1-8, 2009.
-
(2009)
Fourth International Conference on Critical Infrastructures, CRIS 2009
, pp. 1-8
-
-
Tournier, J.-C.1
Goerlitz, O.2
-
9
-
-
34548370980
-
-
EPFL Laboratory for Computer Communications and Applications, Lausanne, Switzerland, Tech. Rep. LCA-REPORT-2006-002, June
-
M. Felegyhazi and J.-P. Hubaux, "Game theory in wireless networks: A tutorial," EPFL Laboratory for Computer Communications and Applications, Lausanne, Switzerland, Tech. Rep. LCA-REPORT-2006-002, June 2006.
-
(2006)
Game Theory in Wireless Networks: A Tutorial
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
-
12
-
-
84870349182
-
Slave Diversity: Using Multiple Paths to Improve the Accuracy of Clock Synchronization Protocols
-
accepted, to appear in
-
T. Mizrahi, "Slave Diversity: Using Multiple Paths to Improve the Accuracy of Clock Synchronization Protocols", accepted, to appear in Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS, 2012.
-
Proceedings of the International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication, ISPCS, 2012
-
-
Mizrahi, T.1
-
14
-
-
0028758682
-
On the Dynamics and Significance of Low Frequency Components of Internet Load
-
December
-
A. Mukherjee, "On the Dynamics and Significance of Low Frequency Components of Internet Load," Internetworking: Research and Experience, Vol. 5, pp. 163-205, December 1994.
-
(1994)
Internetworking: Research and Experience
, vol.5
, pp. 163-205
-
-
Mukherjee, A.1
-
16
-
-
84870368799
-
-
IETF, draft-ietf-tictoc-security-requirements, work in progress
-
T. Mizrahi, K. O'Donoghue, "TICTOC Security Requirements", IETF, draft-ietf-tictoc-security-requirements, work in progress, 2011.
-
(2011)
TICTOC Security Requirements
-
-
Mizrahi, T.1
O'Donoghue, K.2
-
17
-
-
0021898159
-
Synchronizing Clocks in the Presence of Faults
-
L. Lamport, P. M. Melliar-Smith, "Synchronizing Clocks in the Presence of Faults", Journal of the ACM (JACM), Volume 32, Issue 1, 1985.
-
(1985)
Journal of the ACM (JACM)
, vol.32
, Issue.1
-
-
Lamport, L.1
Melliar-Smith, P.M.2
|