-
1
-
-
79956372463
-
-
Cyber Security Working Group, ", " Guideline, Sep. [Online]. Available
-
NIST Smart Grid, Cyber Security Working Group, "Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security, " Guideline, Sep. 2010. [Online]. Available: www.nist.gov/smartgrid.
-
(2010)
Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security
-
-
-
2
-
-
79953696818
-
Survey of cyber security issues in smart grids
-
090D-1
-
T. M. Chen, "Survey of cyber security issues in smart grids, " Cyber Security, Situation Management, and Impact Assessment II; and Visual Analytics for Homeland Defense and Security II (part of SPIE DSS 2010), pp. 77 090D-1, 2010.
-
(2010)
Cyber Security, Situation Management, and Impact Assessment II; and Visual Analytics for Homeland Defense and Security II (Part of SPIE DSS 2010)
, pp. 77
-
-
Chen, T.M.1
-
4
-
-
84865482588
-
Ami mesh networksa practical solution and its performance evaluation
-
P. Kulkarni, S. Gormus, Z. Fan, and F. Ramos, "Ami mesh networksa practical solution and its performance evaluation, " IEEE Trans. on Smart Grid, vol. 3, no. 3, pp. 1469-1481, 2012.
-
(2012)
IEEE Trans. on Smart Grid
, vol.3
, Issue.3
, pp. 1469-1481
-
-
Kulkarni, P.1
Gormus, S.2
Fan, Z.3
Ramos, F.4
-
5
-
-
84873707949
-
Smart grid communications: Overview of research challenges, solutions, and standardization activities
-
Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, Z. Zhu, S. Lambotharan, and W. H. Chin, "Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities, " IEEE Commun. Surveys & Tutorials, vol. 15, no. 1, pp. 21-38, 2013.
-
(2013)
IEEE Commun. Surveys & Tutorials
, vol.15
, Issue.1
, pp. 21-38
-
-
Fan, Z.1
Kulkarni, P.2
Gormus, S.3
Efthymiou, C.4
Kalogridis, G.5
Sooriyabandara, M.6
Zhu, Z.7
Lambotharan, S.8
Chin, W.H.9
-
6
-
-
84921681906
-
Efficient authentication and key management mechanisms for smart grid communications
-
Jan
-
H. Nicanfar, P. Jokar, K. Beznosov, and V. C. M. Leung, "Efficient Authentication and Key Management Mechanisms for Smart Grid Communications, " accepted for publication in IEEE Systems Journal, Jan. 2013.
-
(2013)
Publication in IEEE Systems Journal
-
-
Nicanfar, H.1
Jokar, P.2
Beznosov, K.3
Leung, V.C.M.4
-
7
-
-
77954655594
-
Secure anonymous routing for MANETS using distributed dynamic random path selection
-
V. Mohanty, D. Moliya, C. Hota, and M. Rajarajan, "Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection, " Intell. and Security Informatics, pp. 65-72, 2010.
-
(2010)
Intell. and Security Informatics
, pp. 65-72
-
-
Mohanty, V.1
Moliya, D.2
Hota, C.3
Rajarajan, M.4
-
8
-
-
84891351801
-
-
URL
-
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, " URL: http://dud.inf.tu-dresden.de/literatur/AnonTerminologyv0, vol. 34, 2010.
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
, vol.34
-
-
Pfitzmann, A.1
Hansen, M.2
-
10
-
-
38549121414
-
ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks
-
IEEE
-
X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen, and Z. Cao, "ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks, " in IEEE International Conference onCommunications (ICC). IEEE, 2007, pp. 1247-1253.
-
(2007)
IEEE International Conference OnCommunications (ICC)
, pp. 1247-1253
-
-
Lin, X.1
Lu, R.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
Cao, Z.6
-
11
-
-
79952992733
-
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
-
Y. Fan, Y. Jiang, H. Zhu, J. Chen, and X. S. Shen, "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks, " IEEE Trans. on Wireless Communications, vol. 10, no. 3, pp. 834-843, 2011.
-
(2011)
IEEE Trans. on Wireless Communications
, vol.10
, Issue.3
, pp. 834-843
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Chen, J.4
Shen, X.S.5
-
12
-
-
79960862937
-
Anonymous communication with network coding against traffic analysis attack
-
IEEE
-
J. Wang, J. Wang, C. Wu, K. Lu, and N. Gu, "Anonymous communication with network coding against traffic analysis attack, " in IEEE INFOCOM. IEEE, 2011, pp. 1008-1016.
-
(2011)
IEEE INFOCOM
, pp. 1008-1016
-
-
Wang, J.1
Wang, J.2
Wu, C.3
Lu, K.4
Gu, N.5
-
13
-
-
85032750989
-
Network coding for the internet and wireless networks
-
P. A. Chou and Y. Wu, "Network coding for the internet and wireless networks, " IEEE Signal Processing Magazine, vol. 24, no. 5, pp. 77-85, 2007.
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.5
, pp. 77-85
-
-
Chou, P.A.1
Wu, Y.2
-
14
-
-
69749123078
-
Linear network coding construction for multi-source multicast network
-
IEEE
-
P. Bao-xing, Y. Lu-ming, W. Wei-ping, and X. Xiao, "Linear Network Coding Construction for Multi-Source Multicast Network, " in First International Workshop on Education Technology and Computer Science (ETCS), vol. 3. IEEE, 2009, pp. 114-118.
-
(2009)
First International Workshop on Education Technology and Computer Science (ETCS)
, vol.3
, pp. 114-118
-
-
Bao-Xing, P.1
Lu-Ming, Y.2
Wei-Ping, W.3
Xiao, X.4
-
15
-
-
80053219965
-
Optimal sub-graph selection over coded networks with delay and limited-size buffering
-
H. Ghasvari, M. Raayatpanah, B. Khalaj, and H. Bakhshi, "Optimal sub-graph selection over coded networks with delay and limited-size buffering, " IET Commun., vol. 5, no. 11, pp. 1497-1505, 2011.
-
(2011)
IET Commun.
, vol.5
, Issue.11
, pp. 1497-1505
-
-
Ghasvari, H.1
Raayatpanah, M.2
Khalaj, B.3
Bakhshi, H.4
-
16
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao, "On the security of public key protocols, " IEEE Trans. on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
-
(1983)
IEEE Trans. on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
17
-
-
33947399169
-
A random linear network coding approach to multicast
-
T. Ho, M. Ḿedard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast, " IEEE Trans. on Information Theory,, vol. 52, no. 10, pp. 4413-4430, 2006.
-
(2006)
IEEE Trans. on Information Theory
, vol.52
, Issue.10
, pp. 4413-4430
-
-
Ho, T.1
Ḿedard, M.2
Koetter, R.3
Karger, D.R.4
Effros, M.5
Shi, J.6
Leong, B.7
|