메뉴 건너뛰기




Volumn 27, Issue 1, 2013, Pages 12-18

A layered encryption mechanism for networked critical infrastructures

Author keywords

[No Author keywords available]

Indexed keywords

CYBER SECURITY; GEOGRAPHIC AREAS; HASH CHAINS; INFRASTRUCTURE NETWORKS; KEY MANAGEMENT; LAYERED SECURITY; PERIMETER DEFENSE; PROTECTED ZONES; SECRET INFORMATION; SECURITY MEASURE; SENSITIVE DATAS;

EID: 84873302493     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2013.6423186     Document Type: Article
Times cited : (27)

References (12)
  • 2
    • 79956357124 scopus 로고    scopus 로고
    • Challenges and Opportunities in Smart Grid: A Position Article
    • G. W. Arnold, "Challenges and Opportunities in Smart Grid: A Position Article," Proc. IEEE, vol. 99, no. 6, 2011, pp. 922-27.
    • (2011) Proc. IEEE , vol.99 , Issue.6 , pp. 922-927
    • Arnold, G.W.1
  • 3
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password Authentication with Insecure Communication," Commun. ACM, vol. 24, no. 11, 1981, pp. 770-72.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 6
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • X. Wang and H. Yu, "How to Break MD5 and Other Hash Functions," Proc. 24th Annual Int'l. Conf. Theory and Applications of Cryptographic Techniques, 2005, pp. 19-35. (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 8
    • 84891808534 scopus 로고    scopus 로고
    • Design and implementation of a secure modbus protocol
    • I. Nai Fovino et al., "Design and Implementation of a Secure Modbus Protocol, Critical Infrastructure Protection III," vol. 311, 2009, pp. 83-96.
    • (2009) Critical Infrastructure Protection III , vol.311 , pp. 83-96
    • Nai Fovino, I.1
  • 9
    • 77954323255 scopus 로고    scopus 로고
    • Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA
    • H. Alzaid et al., "Mitigating Sandwich Attacks against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA," Proc. 24th Int'l. Conf. Advanced Information Networking and Applications, 2010, pp. 859-65.
    • (2010) Proc. 24th int'L. Conf. Advanced Information Networking and Applications , pp. 859-865
    • Alzaid, H.1
  • 10
    • 79955867639 scopus 로고    scopus 로고
    • A multidimensional critical state analysis for detecting intrusions in SCADA Systems
    • A. Carcano et al., "A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems," IEEE Trans. Industrial Informatics, vol. 7, no. 2, 2011, pp. 179-86.
    • (2011) IEEE Trans. Industrial Informatics , vol.7 , Issue.2 , pp. 179-186
    • Carcano, A.1
  • 11
    • 80053528646 scopus 로고    scopus 로고
    • An early warning system against malicious activities for smart grid communications
    • Z. Md. Fadlullah et al., "An Early Warning System against Malicious Activities for Smart Grid Communications," IEEE Network, vol. 25, no. 5, 2011, pp. 50-55.
    • (2011) IEEE Network , vol.25 , Issue.5 , pp. 50-55
    • Md. Fadlullah, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.