-
4
-
-
84962858406
-
-
Accessed 2015/2/17
-
J. Delsing. ARROWHEAD framework. [Online]. Accessed 2015/2/17. [Online]. Available: http://www. arrowhead. eu/about/arrowhead-common-technology/arrowhead-framework/
-
ARROWHEAD Framework
-
-
Delsing, J.1
-
5
-
-
84983157129
-
A secure hardware module and system concept for local and remote industrial embedded system identification
-
C. Lesjak, T. Ruprechter, J. Haid, H. Bock, and E. Brenner, "A secure hardware module and system concept for local and remote industrial embedded system identification, " in IEEE ETFA, 2014.
-
(2014)
IEEE ETFA
-
-
Lesjak, C.1
Ruprechter, T.2
Haid, J.3
Bock, H.4
Brenner, E.5
-
6
-
-
84949922081
-
Estado-enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online
-
C. Lesjak, T. Ruprechter, H. Bock, J. Haid, and E. Brenner, "Estado-enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online, " in ICITST, 2014.
-
(2014)
ICITST
-
-
Lesjak, C.1
Ruprechter, T.2
Bock, H.3
Haid, J.4
Brenner, E.5
-
7
-
-
84889002308
-
Industrial control systems security: What is happening?
-
M. Krotofil and D. Gollmann, "Industrial control systems security: What is happening?" in IEEE INDIN, 2013.
-
(2013)
IEEE INDIN
-
-
Krotofil, M.1
Gollmann, D.2
-
9
-
-
84889027178
-
From insider threats to business processes that are secure-by-design
-
D. Gollmann, "From insider threats to business processes that are secure-by-design, " in INCoS, 2011.
-
(2011)
INCoS
-
-
Gollmann, D.1
-
12
-
-
84869429339
-
The most dangerous code in the world: Validating SSL certificates in non-browser software
-
M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov, "The most dangerous code in the world: validating SSL certificates in non-browser software, " in ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
13
-
-
84869487159
-
Why Eve and mallory love Android: An analysis of android SSL (in)security
-
S. Fahl, M. Harbach, T. Muders, M. Smith, L. Baumgärtner, and B. Freisleben, "Why eve and mallory love Android: An analysis of android SSL (in)security, " in ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Baumgärtner, L.5
Freisleben, B.6
-
14
-
-
84949485601
-
An empirical study of cryptographic misuse in Android applications
-
M. Egele, D. Brumley, Y. Fratantonio, and C. Kruegel, "An empirical study of cryptographic misuse in Android applications, " in ACM SIGSAC, 2013.
-
(2013)
ACM SIGSAC
-
-
Egele, M.1
Brumley, D.2
Fratantonio, Y.3
Kruegel, C.4
-
15
-
-
84861198383
-
Cyber-physical systems: A perspective at the centennial
-
Centennial-Issue
-
K. Kim and P. R. Kumar, "Cyber-physical systems: A perspective at the centennial, " Proceedings of the IEEE, vol. 100, no. Centennial-Issue, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
-
-
Kim, K.1
Kumar, P.R.2
-
16
-
-
84949501110
-
Tandem smart cards: Enforcing trust for TLSbased network services
-
P. Urien and S. Elrharbi, "Tandem smart cards: enforcing trust for TLSbased network services, " in IEEE ASWN, 2008.
-
(2008)
IEEE ASWN
-
-
Urien, P.1
Elrharbi, S.2
-
20
-
-
84865516697
-
The security and performance of the galois/counter mode (GCM) of operation
-
D. A. McGrew and J. Viega, "The security and performance of the galois/counter mode (GCM) of operation, " in INDOCRYPT, 2004.
-
(2004)
INDOCRYPT
-
-
McGrew, D.A.1
Viega, J.2
|