-
2
-
-
0026242010
-
Internet time synchronization: the network time protocol
-
D. L. Mills, 1991, "Internet time synchronization: the network time protocol," IEEE Transactions on Communications, 39, 1482-1493.
-
(1991)
IEEE Transactions on Communications
, vol.39
, pp. 1482-1493
-
-
Mills, D.L.1
-
3
-
-
84877803267
-
Principles and Features of PROFInet
-
(CRC Press/Taylor & Francis), chapter 11
-
M. Popp, J. Feld, and R. Büsgen, 2005, "Principles and Features of PROFInet," The Industrial Communication Technology Handbook (CRC Press/Taylor & Francis), chapter 11, p.11.1.
-
(2005)
The Industrial Communication Technology Handbook
-
-
Popp, M.1
Feld, J.2
Büsgen, R.3
-
4
-
-
84884858189
-
Dependable Time-Triggered Communication
-
(CRC Press, Taylor & Francis), chapter 12
-
H. Kopertz, G. Bauer, and W. 2005, "Dependable Time-Triggered Communication," The Industrial Communication Technology Handbook (CRC Press, Taylor & Francis), chapter 12, pp. 12.1.
-
The Industrial Communication Technology Handbook
-
-
Kopertz, H.1
Bauer, G.2
-
5
-
-
33744455490
-
-
Proceedings of the 2005 IEEE International Symposium on Power Line Communications and its Applications, 6-8 April 2005, Vancouver, Canada (IEEE)
-
G. Gaderer, T. Sauter, and G. Bumiller, 2005, "Clock Synchronization in Powerline Networks," in Proceedings of the 2005 IEEE International Symposium on Power Line Communications and its Applications, 6-8 April 2005, Vancouver, Canada (IEEE), pp. 71-75.
-
(2005)
Clock Synchronization in Powerline Networks
, pp. 71-75
-
-
Gaderer, G.1
Sauter, T.2
Bumiller, G.3
-
6
-
-
84877800093
-
-
National Institute of Standards and Technology, available at
-
National Institute of Standards and Technology, "Secure Hash Signature Standard (SHS) (FIPS PUB 180-2)," available at http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf or http://csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdf.
-
Secure Hash Signature Standard (SHS) (FIPS PUB 180-2)
-
-
-
7
-
-
0013091373
-
-
National Institute of Standards and Technology, available at
-
National Institute of Standards and Technology, "The Keyed-Hash Message Authentication Code (HMAC) (FIPS PUB 180-2)," available at http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf.
-
The Keyed-Hash Message Authentication Code (HMAC) (FIPS PUB 180-2)
-
-
-
8
-
-
33744459510
-
-
Proceedings of the 2005 International Symposium on Power Line Communications and Its Applications, 6-8 April 2005, Vancouver, Canada (IEEE)
-
A. Treytl and T. Sauter 2005, "Security Concept for a Wide-Area Low-Bandwidth Power-Line Communication System," in Proceedings of the 2005 International Symposium on Power Line Communications and Its Applications, 6-8 April 2005, Vancouver, Canada (IEEE), pp. 66-70.
-
(2005)
Security Concept for a Wide-Area Low-Bandwidth Power-Line Communication System
, pp. 66-70
-
-
Treytl, A.1
Sauter, T.2
-
9
-
-
84876866469
-
-
th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '03), 16-19 September 2003, Lisbon, Portugal (IEEE)
-
th IEEE Conference on Emerging Technologies and Factory Automation (ETFA '03), 16-19 September 2003, Lisbon, Portugal (IEEE), pp. 422-426.
-
(2003)
Embedded SynUTC and IEEE 1588 clock synchronization for industrial Ethernet
, pp. 422-426
-
-
Höller, R.1
Sauter, T.2
Kerö, N.3
-
10
-
-
0004245967
-
-
NIST Technical Note 1337 (National Institute of Standards and Technology, Boulder, Colorado)
-
D. B. Sullivan, D. W. Allan, D. A. Howe, and F. L. Walls, 1990, Characterization of clocks and Oscillators, NIST Technical Note 1337 (National Institute of Standards and Technology, Boulder, Colorado).
-
(1990)
Characterization of clocks and Oscillators
-
-
Sullivan, D.B.1
Allan, D.W.2
Howe, D.A.3
Walls, F.L.4
|