메뉴 건너뛰기




Volumn , Issue , 2015, Pages 1243-1250

Securing smart maintenance services: Hardware-security and TLS for MQTT

Author keywords

Authentication; Cryptography; Internet; Maintenance engineering; Production; Protocols

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; HARDWARE; INFORMATION SCIENCE; INTERNET; INTERNET PROTOCOLS; MAINTAINABILITY; MAINTENANCE; NETWORK PROTOCOLS; PRODUCTION; REPAIR;

EID: 84949521136     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INDIN.2015.7281913     Document Type: Conference Paper
Times cited : (58)

References (20)
  • 4
    • 84962858406 scopus 로고    scopus 로고
    • Accessed 2015/2/17
    • J. Delsing. ARROWHEAD framework. [Online]. Accessed 2015/2/17. [Online]. Available: http://www. arrowhead. eu/about/arrowhead-common-technology/arrowhead-framework/
    • ARROWHEAD Framework
    • Delsing, J.1
  • 5
    • 84983157129 scopus 로고    scopus 로고
    • A secure hardware module and system concept for local and remote industrial embedded system identification
    • C. Lesjak, T. Ruprechter, J. Haid, H. Bock, and E. Brenner, "A secure hardware module and system concept for local and remote industrial embedded system identification, " in IEEE ETFA, 2014.
    • (2014) IEEE ETFA
    • Lesjak, C.1    Ruprechter, T.2    Haid, J.3    Bock, H.4    Brenner, E.5
  • 6
    • 84949922081 scopus 로고    scopus 로고
    • Estado-enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online
    • C. Lesjak, T. Ruprechter, H. Bock, J. Haid, and E. Brenner, "Estado-enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online, " in ICITST, 2014.
    • (2014) ICITST
    • Lesjak, C.1    Ruprechter, T.2    Bock, H.3    Haid, J.4    Brenner, E.5
  • 7
    • 84889002308 scopus 로고    scopus 로고
    • Industrial control systems security: What is happening?
    • M. Krotofil and D. Gollmann, "Industrial control systems security: What is happening?" in IEEE INDIN, 2013.
    • (2013) IEEE INDIN
    • Krotofil, M.1    Gollmann, D.2
  • 9
    • 84889027178 scopus 로고    scopus 로고
    • From insider threats to business processes that are secure-by-design
    • D. Gollmann, "From insider threats to business processes that are secure-by-design, " in INCoS, 2011.
    • (2011) INCoS
    • Gollmann, D.1
  • 12
    • 84869429339 scopus 로고    scopus 로고
    • The most dangerous code in the world: Validating SSL certificates in non-browser software
    • M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov, "The most dangerous code in the world: validating SSL certificates in non-browser software, " in ACM CCS, 2012.
    • (2012) ACM CCS
    • Georgiev, M.1    Iyengar, S.2    Jana, S.3    Anubhai, R.4    Boneh, D.5    Shmatikov, V.6
  • 14
    • 84949485601 scopus 로고    scopus 로고
    • An empirical study of cryptographic misuse in Android applications
    • M. Egele, D. Brumley, Y. Fratantonio, and C. Kruegel, "An empirical study of cryptographic misuse in Android applications, " in ACM SIGSAC, 2013.
    • (2013) ACM SIGSAC
    • Egele, M.1    Brumley, D.2    Fratantonio, Y.3    Kruegel, C.4
  • 15
    • 84861198383 scopus 로고    scopus 로고
    • Cyber-physical systems: A perspective at the centennial
    • Centennial-Issue
    • K. Kim and P. R. Kumar, "Cyber-physical systems: A perspective at the centennial, " Proceedings of the IEEE, vol. 100, no. Centennial-Issue, 2012.
    • (2012) Proceedings of the IEEE , vol.100
    • Kim, K.1    Kumar, P.R.2
  • 16
    • 84949501110 scopus 로고    scopus 로고
    • Tandem smart cards: Enforcing trust for TLSbased network services
    • P. Urien and S. Elrharbi, "Tandem smart cards: enforcing trust for TLSbased network services, " in IEEE ASWN, 2008.
    • (2008) IEEE ASWN
    • Urien, P.1    Elrharbi, S.2
  • 20
    • 84865516697 scopus 로고    scopus 로고
    • The security and performance of the galois/counter mode (GCM) of operation
    • D. A. McGrew and J. Viega, "The security and performance of the galois/counter mode (GCM) of operation, " in INDOCRYPT, 2004.
    • (2004) INDOCRYPT
    • McGrew, D.A.1    Viega, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.