-
2
-
-
77950187312
-
KMA- A key management architecture for SCADA systems
-
R. D. Colin, C. Boyd, J. Manuel, and G. Nieto, "KMA- A key management architecture for SCADA systems, " in Proceedings of the 4th Australasian Information Security Workshop, Vol. 54, 2006, pp. 138-192.
-
(2006)
Proceedings of the 4th Australasian Information Security Workshop
, vol.54
, pp. 138-192
-
-
Colin, R.D.1
Boyd, C.2
Manuel, J.3
Nieto, G.4
-
5
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, and J. D. Tygar, "ELK, a new protocol for efficient large group key distribution, " in Proceedings of IEEE Symposium on Security and Privacy, 2001, pp. 247-262. (Pubitemid 32882640)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges, " Designs, Codes and Cryptography, Vol. 2, 1992, pp. 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
7
-
-
33745471659
-
Next generation SCADA security: Best practices and client puzzles
-
DOI 10.1109/IAW.2005.1495984, 1495984, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
C. L. Bowen, T. K. Buennemeyer, and R. W. Thomas, "Next generation SCADA security: Best practices and client puzzles, " in Proceedings of IEEE Workshop on Information Assurance and Security United States Military Academy, 2005, pp. 426-427. (Pubitemid 43948754)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 426-427
-
-
Bowen III, C.L.1
Buennemeyer, T.K.2
Thomas, R.W.3
-
9
-
-
33750391626
-
Low-latency cryptographic protection for SCADA communications
-
A. K. Wright, J. A. Kinast, and J. McCarty, "Low-latency cryptographic protection for SCADA communications, " in Proceedings of the 2nd International Conference on Applied Cryptography and Network Security, 2004, pp. 263-277.
-
(2004)
Proceedings of the 2nd International Conference on Applied Cryptography and Network Security
, pp. 263-277
-
-
Wright, A.K.1
Kinast, J.A.2
McCarty, J.3
-
11
-
-
84876222909
-
Communication Technologies, "Supervisory control and data acquisition (SCADA) systems
-
Communication Technologies, "Supervisory control and data acquisition (SCADA) systems, " NCS Technical Information Bulletin 04-1, 2004.
-
(2004)
NCS Technical Information Bulletin 04-1
-
-
-
12
-
-
67650661171
-
Advanced key management architecture for secure SCADA communications
-
D. Choi, H. Kim, D. Won, and S. Kim, "Advanced key management architecture for secure SCADA communications, " IEEE Transactions on Power Delivery, Vol. 24, 2009, pp. 1154-1163.
-
(2009)
IEEE Transactions on Power Delivery
, vol.24
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
13
-
-
77950187346
-
Efficient secure group communications for SCADA
-
D. Choi, S. Lee, D. Won, and S. Kim, "Efficient secure group communications for SCADA, " IEEE Transactions on Power Delivery, Vol. 25, 2010, pp. 714-722.
-
(2010)
IEEE Transactions on Power Delivery
, vol.25
, pp. 714-722
-
-
Choi, D.1
Lee, S.2
Won, D.3
Kim, S.4
-
14
-
-
0032218234
-
Authenticated group key agreement and friends
-
G. Ateniese, M. Steiner, and G. Tsudik, "Authenticated group key agreement and friends, " in Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998, pp. 17-26.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
15
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method of obtaining digital signature and public key cryptosystem, " Communications of the ACM, Vol. 21, 1978, pp. 120- 126. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
16
-
-
3042583499
-
Secure group communication using robust contributory key agreement
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, and G. Tsudik, "Secure group communication using robust contributory key agreement, " IEEE Transactions on Parallel and Distributed Systems, Vol. 15, 2004, pp. 468-480.
-
(2004)
IEEE Transactions on Parallel and Distributed Systems
, vol.15
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.4
Stanton, J.5
Tsudik, G.6
-
17
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement, " ACM Transactions on Information and System Security, Vol. 7, 2004, pp. 60-96.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
18
-
-
84948991087
-
A secure and efficient conference key distribution system
-
LNCS, Vol. 950
-
M. Burmester and T. Desmedt, "A secure and efficient conference key distribution system, " in Proceedings of EUROCRYPT '94, LNCS, Vol. 950, 1995, pp. 275-286.
-
(1995)
Proceedings of EUROCRYPT '94
, pp. 275-286
-
-
Burmester, M.1
Desmedt, T.2
-
19
-
-
24944449952
-
An authenticated group key agreement for wireless networks
-
NET37-4, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
-
C. H. Tan and J. C. M. Teo, "An authenticated group key agreement for wireless networks, " in Proceedings of IEEE Wireless Communications and Networking Conference, Vol. 4, 2005, pp. 2100-2105. (Pubitemid 41310820)
-
(2005)
IEEE Wireless Communications and Networking Conference, WCNC
, vol.4
, pp. 2100-2105
-
-
Tan, C.H.1
Teo, J.C.M.2
-
20
-
-
35048892094
-
Simple and efficient group key agreement based on factoring
-
LNCS, Vol. 3043
-
J. Nam, S. Cho, S. Kim, and D. Won, "Simple and efficient group key agreement based on factoring, " in Proceedings of International Conference Computational Science and Its Applications, LNCS, Vol. 3043, 2004, pp. 645-654.
-
(2004)
Proceedings of International Conference Computational Science and its Applications
, pp. 645-654
-
-
Nam, J.1
Cho, S.2
Kim, S.3
Won, D.4
-
23
-
-
80052113604
-
Proposal strategies of key management for data encryption in SCADA network of electric power systems
-
D. J. Kang, J. J. Lee, B. H. Kim, and D. Hur, "Proposal strategies of key management for data encryption in SCADA network of electric power systems, " International Journal of Electrical Power and Energy Systems, Vol. 33, 2011, pp. 1521- 1526.
-
(2011)
International Journal of Electrical Power and Energy Systems
, vol.33
, pp. 1521-1526
-
-
Kang, D.J.1
Lee, J.J.2
Kim, B.H.3
Hur, D.4
-
24
-
-
67649574667
-
-
NIST Special Publication, 800-56A
-
E. Barker, D. Johnson, and M. Smid, "Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography, " NIST Special Publication, 800-56A, 2007.
-
(2007)
Recommendation for Pair-wise Key Establishment Schemes Using Discrete Logarithm Cryptography
-
-
Barker, E.1
Johnson, D.2
Smid, M.3
-
26
-
-
84876221249
-
-
Cliques, http://sprout.ics.uci.edu/past-projects/cliques/download.html.
-
Cliques
-
-
-
27
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups, " IEEE Transactions on Parallel and Distributed Systems, 2000, pp. 769-780.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
28
-
-
70549098091
-
Optimizing SD and LSD in presence of non-uniform probabilities of revocation
-
LNCS, Vol. 4883
-
P. D'Arco and A. de Santis, "Optimizing SD and LSD in presence of non-uniform probabilities of revocation, " in Proceedings of International Conference Information Theoretic Security, LNCS, Vol. 4883, 2009, pp. 46-64.
-
(2009)
Proceedings of International Conference Information Theoretic Security
, pp. 46-64
-
-
D'Arco, P.1
De Santis, A.2
|