-
2
-
-
35048826242
-
The eax mode of operation
-
M. Bellare, P. Rogaway, and D. Wagner, "The eax mode of operation, " in FSE '04, 2004, pp. 389-407.
-
(2004)
FSE '04
, pp. 389-407
-
-
Bellare, M.1
Rogaway, P.2
Wagner, D.3
-
3
-
-
0038341105
-
Silicon physical random functions
-
New York, NY, USA: ACM
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions, " in CCS '02. New York, NY, USA: ACM, 2002, pp. 148-160.
-
(2002)
CCS '02
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
4
-
-
79956013194
-
Puf roks: A hardware approach to read-once keys
-
New York, NY, USA: ACM
-
M. S. Kirkpatrick, S. Kerr, and E. Bertino, "Puf roks: A hardware approach to read-once keys, " in ASIACCS '11. New York, NY, USA: ACM, 2011, pp. 155-164.
-
(2011)
ASIACCS '11
, pp. 155-164
-
-
Kirkpatrick, M.S.1
Kerr, S.2
Bertino, E.3
-
5
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
London, UK: Springer-Verlag
-
T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing, " in CRYPTO '91. London, UK: Springer-Verlag, 1992, pp. 129-140.
-
(1992)
CRYPTO '91
, pp. 129-140
-
-
Pedersen, T.1
-
6
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
New York, NY, USA: Springer-Verlag New York, Inc.
-
C. Schnorr, "Efficient identification and signatures for smart cards, " in CRYPTO '89. New York, NY, USA: Springer-Verlag New York, Inc. , 1989, pp. 239-252.
-
(1989)
CRYPTO '89
, pp. 239-252
-
-
Schnorr, C.1
-
7
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
London, UK, UK: Springer-Verlag
-
R. J. Anderson and M. G. Kuhn, "Low cost attacks on tamper resistant devices, " in Proceedings of the 5th Int. Workshop on Security Protocols. London, UK, UK: Springer-Verlag, 1998, pp. 125-136.
-
(1998)
Proceedings of the 5th Int. Workshop on Security Protocols
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
8
-
-
77952783550
-
A privacy-preserving approach to policy-based content dissemination
-
N. Shang, M. Nabeel, F. Paci, and E. Bertino, "A privacy-preserving approach to policy-based content dissemination, " in ICDE '10, 2010.
-
(2010)
ICDE '10
-
-
Shang, N.1
Nabeel, M.2
Paci, F.3
Bertino, E.4
-
9
-
-
34547307341
-
Physical unclonable functions for device authentication and secret key generation
-
New York, NY, USA: ACM
-
G. E. Suh and S. Devadas, "Physical unclonable functions for device authentication and secret key generation, " in DAC '07. New York, NY, USA: ACM, 2007, pp. 9-14.
-
(2007)
DAC '07
, pp. 9-14
-
-
Suh, G.E.1
Devadas, S.2
-
10
-
-
70349252061
-
Binding software to specific native hardware in a vm environment: The puf challenge and opportunity
-
New York, NY, USA: ACM
-
M. J. Atallah, E. D. Bryant, J. T. Korb, and J. R. Rice, "Binding software to specific native hardware in a vm environment: The puf challenge and opportunity, " in VMSec '08. New York, NY, USA: ACM, 2008, pp. 45-48.
-
(2008)
VMSec '08.
, pp. 45-48
-
-
Atallah, M.J.1
Bryant, E.D.2
Korb, J.T.3
Rice, J.R.4
-
11
-
-
82155185209
-
A lightweight message authentication scheme for smart grid communications
-
dec.
-
M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, "A lightweight message authentication scheme for smart grid communications, " IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 675-685, dec. 2011.
-
(2011)
IEEE Trans. on Smart Grid
, vol.2
, Issue.4
, pp. 675-685
-
-
Fouda, M.1
Fadlullah, Z.2
Kato, N.3
Lu, R.4
Shen, X.5
-
12
-
-
82155192847
-
Multicast authentication in the smart grid with onetime signature
-
dec.
-
Q. Li and G. Cao, "Multicast authentication in the smart grid with onetime signature, " IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 686-696, dec. 2011.
-
(2011)
IEEE Trans. on Smart Grid
, vol.2
, Issue.4
, pp. 686-696
-
-
Li, Q.1
Cao, G.2
-
13
-
-
79957773391
-
Fault-tolerant and scalable key management for smart grid
-
june
-
D. Wu and C. Zhou, "Fault-tolerant and scalable key management for smart grid, " IEEE Trans. on Smart Grid, vol. 2, no. 2, pp. 375-381, june 2011.
-
(2011)
IEEE Trans. on Smart Grid
, vol.2
, Issue.2
, pp. 375-381
-
-
Wu, D.1
Zhou, C.2
-
14
-
-
84864368548
-
Token based key management scheme for scada communication
-
july
-
A. Saxena, O. Pal, S. Saiwan, and Z. Saquib, "Token based key management scheme for scada communication, " Int. J. on Distributed and Parallel Systems, vol. 2, no. 4, pp. 69-86, july 2011.
-
(2011)
Int. J. on Distributed and Parallel Systems
, vol.2
, Issue.4
, pp. 69-86
-
-
Saxena, A.1
Pal, O.2
Saiwan, S.3
Saquib, Z.4
-
15
-
-
67650661171
-
Advanced key-management architecture for secure scada communications
-
july
-
D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key-management architecture for secure scada communications, " IEEE Trans. on Power Delivery, vol. 24, no. 3, pp. 1154-1163, july 2009.
-
(2009)
IEEE Trans. on Power Delivery
, vol.24
, Issue.3
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
16
-
-
77950187346
-
Efficient secure group communications for scada
-
april
-
D. Choi, S. Lee, D. Won, and S. Kim, "Efficient secure group communications for scada, " IEEE Trans. on Power Delivery, vol. 25, no. 2, pp. 714-722, april 2010.
-
(2010)
IEEE Trans. on Power Delivery
, vol.25
, Issue.2
, pp. 714-722
-
-
Choi, D.1
Lee, S.2
Won, D.3
Kim, S.4
|