-
3
-
-
35048896647
-
-
AGA Report No. 12 Draft 2, 5 February 2004, The draft 2 is no longer available online, The draft 3 is available for purchase (accessed on 22 February 2010)
-
AGA Report No. 12 (2004) 'Cryptographic protection of SCADA communications: general recommendations', Draft 2, 5 February 2004, The draft 2 is no longer available online, The draft 3 is available for purchase at http://www.aga.org/ (accessed on 22 February 2010).
-
(2004)
Cryptographic Protection of SCADA Communications: General Recommendations
-
-
-
4
-
-
0001989185
-
A new family of authentication protocols
-
October
-
Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C. and Needham, R. (1998) 'A new family of authentication protocols', Operating Systems Review, October, Vol. 32, No. 4, pp. 9-20.
-
(1998)
Operating Systems Review
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.4
Manifavas, C.5
Needham, R.6
-
5
-
-
84880876495
-
On-line ciphers and the hash-CBC constructions
-
Lecture Notes in Computer Science 2139, Springer-Verlag
-
Bellare, M., Boldyreva, A., Knudsen, L. and Namprempre, C. (2001) 'On-line ciphers and the Hash-CBC constructions', Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science 2139, Springer-Verlag.
-
(2001)
Advances in Cryptology - Crypto 2001
-
-
Bellare, M.1
Boldyreva, A.2
Knudsen, L.3
Namprempre, C.4
-
6
-
-
3042683432
-
Message authentication using hash functions - The HMAC construction
-
Spring
-
Bellare, M., Canetti, R. and Krawczyk, H. (1996) 'Message authentication using hash functions - the HMAC construction', RSA Laboratories CryptoBytes, Spring, Vol. 2, No. 1.
-
(1996)
RSA Laboratories CryptoBytes
, vol.2
, Issue.1
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M., Kilian, J. and Rogaway, P. (2000) 'The security of the cipher block chaining message authentication code', Journal of Computer and System Sciences, Vol. 6, No. 3, pp. 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.6
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
8
-
-
84884582869
-
Chained stream authentication
-
Waterloo, Canada
-
Bergadano, F., Cavagnino, D. and Crispo, B. (2000a) 'Chained stream authentication', Selected Areas in Cryptography, Waterloo, Canada.
-
(2000)
Selected Areas in Cryptography
-
-
Bergadano, F.1
Cavagnino, D.2
Crispo, B.3
-
9
-
-
0034513710
-
Individual single source authentication on the mbone
-
August
-
Bergadano, F., Cavagnino, D. and Crispo, B. (2000b) 'Individual single source authentication on the mbone', ICME 2000, August, pp. 541-544.
-
(2000)
ICME 2000
, pp. 541-544
-
-
Bergadano, F.1
Cavagnino, D.2
Crispo, B.3
-
10
-
-
17044435613
-
Dissertation could be security threat
-
(accessed on 22 February 2010)
-
Blumenfeld, L. (2003) 'Dissertation could be security threat', Washington Post, available at http://www.washingtonpost.com/ac2/wp-dyn/A23689-2003Jul7 (accessed on 22 February 2010).
-
(2003)
Washington Post
-
-
Blumenfeld, L.1
-
11
-
-
33744722595
-
-
Technical report (accessed on 22 February 2010)
-
Briscoe, B. (2000) 'FLAMeS: fast, loss-tolerant authentication of multicast streams', Technical report, available at http://citeseerx.ist.psu.edu/ viewdoc/download?doi=10.1.1.63.9263&rep=rep1&type=pdf (accessed on 22 February 2010).
-
(2000)
FLAMeS: Fast, Loss-tolerant Authentication of Multicast Streams
-
-
Briscoe, B.1
-
16
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S. and Micali, S. (1987) 'How to construct random functions', J. of the ACM, Vol. 33, No. 4, pp. 792-807.
-
(1987)
J. of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
18
-
-
0003224934
-
The S/KEY one-time password system
-
February
-
Haller, N. (1995) 'The S/KEY one-time password system', IETF RFC 1760, February.
-
(1995)
IETF RFC 1760
-
-
Haller, N.1
-
19
-
-
84884568964
-
-
(accessed on 22 February 2010)
-
Idaho National Laboratory (2008) 'SCADA test bed program', available at http://www.inl.gov/scada/ (accessed on 22 February 2010).
-
(2008)
SCADA Test Bed Program
-
-
-
20
-
-
84884568967
-
-
IEC 608705 (accessed on 22 February 2010)
-
IEC 608705, 'User group maillist information', available at http://www.trianglemicroworks.com/iec60870-5/index.htm (accessed on 22 February 2010).
-
User Group Maillist Information
-
-
-
21
-
-
84884552342
-
-
(accessed on 22 February 2010)
-
IEC TC57, available at http://www.ieee.org/portal/cms-docs-pes/pes/ subpages/publications-folder/TC-57-Column.pdf (accessed on 22 February 2010).
-
IEC TC57
-
-
-
25
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L. (1981) 'Password authentication with insecure communication', Commun. ACM, Vol. 24, No. 11.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
-
-
Lamport, L.1
-
27
-
-
84884536975
-
-
(accessed on 22 February 2010)
-
NIST (2008) 'Industrial control system security (ICS)', available at http://csrc.nist.gov/groups/SMA/fisma/ics/index.html (accessed on 22 February 2010).
-
(2008)
Industrial Control System Security (ICS)
-
-
-
28
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Perrig, A., Canetti, R., Song, D. and Tygar, J. (2001) 'Efficient and secure source authentication for multicast', Network and Distributed System Security Symposium, NDSS'01.
-
(2001)
Network and Distributed System Security Symposium, NDSS'01
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.4
-
29
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Perrig, A., Canetti, R., Tygar, J. and Song, D. (2000) 'Efficient authentication and signing of multicast streams over lossy channels', IEEE Symposium on Security and Privacy.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
30
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J., Wen, V. and Culler, D. (2002) 'SPINS: security protocols for sensor networks', Wireless Networks, Vol. 8, pp. 521-534.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.5
-
32
-
-
84884549128
-
-
SCADAsafe, available at http://scadasafe.sourceforge.net.
-
-
-
-
33
-
-
84884551582
-
-
(accessed on 31 May 2010)
-
USA Today (2007) 'AURORA case: US video shows hacker hit on power grid', available at http://www.usatoday.com/tech/news/computersecurity/2007-09-27- hacker-video-N.htm (accessed on 31 May 2010).
-
(2007)
AURORA Case: US Video Shows Hacker Hit on Power Grid
-
-
-
34
-
-
33750391626
-
Low-latency cryptographic protection for SCADA communications
-
LNCS 3809, Springer
-
Wright, A.K., Kinast, J.A. and McCarty, J. (2004) 'Low-latency cryptographic protection for SCADA communications', Proc. 2nd Int. Conf. on Applied Cryptography and Network Security, ACNS 2004, LNCS 3809, Springer, pp. 263-277.
-
(2004)
Proc. 2nd Int. Conf. on Applied Cryptography and Network Security, ACNS 2004
, pp. 263-277
-
-
Wright, A.K.1
Kinast, J.A.2
McCarty, J.3
|