-
2
-
-
84886683637
-
Industrie 4.0-Alter wein in neuen schlauchen
-
Dec
-
J.Jasperneite, "Industrie 4.0-Alter Wein in neuen Schlauchen?" Computer &Automation (in German), vol.12/12, pp.24-28, Dec 2012.
-
(2012)
Computer &Automation (In German)
, vol.12
, Issue.12
, pp. 24-28
-
-
Jasperneite, J.1
-
3
-
-
84889041573
-
PROFINET security guideline, version 1.0
-
PROFIBUS Nutzerorganisation e.V., "PROFINET Security Guideline, Version 1.0," 2005.
-
(2005)
PROFIBUS Nutzerorganisation E.V.
-
-
-
4
-
-
84888989136
-
-
ODVA.(2011) Securing EtherNet/IP Networks.Last retrieved: 03/2013
-
ODVA.(2011) Securing EtherNet/IP Networks.Last retrieved: 03/2013.[Online].Available: http://www.odva.org/portals/0/library/publications numbered/pub00269r0 odva securing ethernetip networks.pdf
-
-
-
-
5
-
-
8644246007
-
Network security-Who's responsible? [Ethernet in plant floor automation applications]
-
nov.
-
M.Freeman, "Network security-who's responsible? [Ethernet in plant floor automation applications]," IEE Review, vol.50, no.11, p.53, nov.2004.
-
(2004)
IEE Review
, vol.50
, Issue.11
, pp. 53
-
-
Freeman, M.1
-
6
-
-
21644440888
-
Security for industrial communication systems
-
june
-
D.Dzung, M.Naedele, T.Von Hoff, and M.Crevatin, "Security for Industrial Communication Systems," Proceedings of the IEEE, vol.93, no.6, pp.1152-1177, june 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.3
Crevatin, M.4
-
7
-
-
70449642862
-
Exploring security in profinet io
-
july
-
J.Akerberg and M.Bjorkman, "Exploring Security in PROFINET IO," in Computer Software and Applications Conference, 2009.COMPSAC '09.33rd Annual IEEE International, vol.1, july 2009, pp.406-412.
-
(2009)
Computer Software and Applications Conference, 2009.COMPSAC '09.33rd Annual IEEE International
, vol.1
, pp. 406-412
-
-
Akerberg, J.1
Bjorkman, M.2
-
8
-
-
84876395244
-
Security in industrial ethernet
-
Prague, Czech Republic, September
-
J.Peschke, D.Reinelt, W.Yumin, and A.Treytl, "Security in Industrial Ethernet," in 11th IEEE International Conference on Emerging Technologies and Factory Automation Proceedings, Prague, Czech Republic, September 2006.
-
(2006)
11th IEEE International Conference on Emerging Technologies and Factory Automation Proceedings
-
-
Peschke, J.1
Reinelt, D.2
Yumin, W.3
Treytl, A.4
-
14
-
-
84889048461
-
-
NSA.NSA Suite B Cryptography.Last retrieved: 03/2013
-
NSA.NSA Suite B Cryptography.Last retrieved: 03/2013.[Online].Available: http://www.nsa.gov/ia/programs/suiteb cryptography
-
-
-
-
15
-
-
84888992815
-
-
M.Popp, Industrial communication with PROFINET .PROFIBUS Nutzerorganisation e.V., 2007
-
M.Popp, Industrial communication with PROFINET .PROFIBUS Nutzerorganisation e.V., 2007.
-
-
-
-
16
-
-
84889055691
-
-
O.Gay.Implementation of SHA2.Last retrieved: 11/2012
-
O.Gay.Implementation of SHA2.Last retrieved: 11/2012.[Online].Available: http://www.ouah.org/ogay/sha2
-
-
-
-
17
-
-
84889024714
-
-
B.Gladman.Last retrieved: 01/2013
-
B.Gladman.Last retrieved: 01/2013.[Online].Available: http://www.gladman.me.uk
-
-
-
-
18
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
N.Koblitz, Ed.Springer Berlin Heidelberg
-
V.Shoup, "On Fast and Provably Secure Message Authentication Based on Universal Hashing," in Advances in Cryptology CRYPTO 96, ser.Lecture Notes in Computer Science, N.Koblitz, Ed.Springer Berlin Heidelberg, 1996, vol.1109, pp.313-328.
-
(1996)
Advances in Cryptology CRYPTO 96, Ser.Lecture Notes in Computer Science
, vol.1109
, pp. 313-328
-
-
Shoup, V.1
-
19
-
-
38049003873
-
A high speed architecture for galois/counter mode of operation (gcm)
-
B.Yang, S.Mishra, and R.Karri, "A High Speed Architecture for Galois/Counter Mode of Operation (GCM)," Cryptology ePrint Archive, Report 2005/146, 2005, http://eprint.iacr.org/.
-
(2005)
Cryptology EPrint Archive, Report2005/146
-
-
Yang, B.1
Mishra, S.2
Karri, R.3
|