-
1
-
-
84893302626
-
-
Power Syst. Eng. Res. Center, Tech. Rep Feb. [Online]. Available
-
"Cyber-physical systems security for smart grid," Power Syst. Eng. Res. Center, Tech. Rep., Feb. 2012, p. 29. [Online]. Available: http://pserc. wisc.edu/documents/publications/papers/fgwhitepapers/govindarasu-future-grid-white-paper-cps-feb2012.pdf
-
(2012)
Cyber-physical Systems Security for Smart Grid
, pp. 29
-
-
-
2
-
-
85015393794
-
Infrastructure security for smart electric grids: A survey
-
V. Pappu, M. Carvalho, P. Pardalos, Eds. Berlin, Germany: Springer
-
N. M. Pindoriya, D. Dasgupta, D. Srinivasan, M. Carvalho, "Infrastructure security for smart electric grids: A survey," Optimization and Security Challenges in Smart Power Grids (Energy Systems), V. Pappu, M. Carvalho, P. Pardalos, Eds. Berlin, Germany: Springer, 2013, pp. 161-180.
-
(2013)
Optimization and Security Challenges in Smart Power Grids (Energy Systems)
, pp. 161-180
-
-
Pindoriya, N.M.1
Dasgupta, D.2
Srinivasan, D.3
Carvalho, M.4
-
3
-
-
84883342220
-
-
Public Interest Energy Res. (PIER) Prog. Interim Rep., California State Univ., Sacramento, Sacramento, CA, USA, Tech. Rep. CEC-500-2012-047 May [Online]. Available
-
"Smart grid cyber security potential threats, vulnerabilities and risks," Public Interest Energy Res. (PIER) Prog. Interim Rep., California State Univ., Sacramento, Sacramento, CA, USA, Tech. Rep. CEC-500-2012-047, May 2012, p. 83. [Online]. Available: http://www.energy.ca.gov/2012publications/CEC-500-2012-047/CEC-500-2012-047.pdf
-
(2012)
Smart Grid Cyber Security Potential Threats, Vulnerabilities and Risks
, pp. 83
-
-
-
5
-
-
84963933204
-
-
Tropos Wireless Communication Systems, ABB [Online] Available
-
Tropos Wireless Communication Systems, ABB. (2012). A Secure Distribution Area Network Architecture for Smart Grids. [Online]. Available: https://library.e.abb.com/public/e61e21b95fd4482585257bcb006d71d6/GridCom-secure-distributionnetwork-architecture.pdf.
-
(2012)
A Secure Distribution Area Network Architecture for Smart Grids
-
-
-
6
-
-
84875054650
-
Decentralized controls and communications for autonomous distribution networks in smart grid
-
Mar.
-
C.-H. Lo and N. Ansari, "Decentralized controls and communications for autonomous distribution networks in smart grid," IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 66-77, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 66-77
-
-
Lo, C.-H.1
Ansari, N.2
-
7
-
-
84963933212
-
-
Energy Res. Develop. Division, Final Project Rep. CEC-500- 2013-056 [Online]. [Online]. Available
-
"Smart grid information assurance and security technology assessment," Energy Res. Develop. Division, Final Project Rep. CEC-500-2013-056, 2010. [Online]. [Online]. Available: http://www.energy.ca.gov/2013publications/CEC-500-2013-056/CEC-500-2013-056.pdf
-
(2010)
Smart Grid Information Assurance and Security Technology Assessment
-
-
-
8
-
-
84946090584
-
State of the art authentication, access control, secure integration in smart grid
-
Oct.
-
N. Saxena and B. J. Choi, "State of the art authentication, access control, secure integration in smart grid," Energies, vol. 8, pp. 11883-11915, Oct. 2015.
-
(2015)
Energies
, vol.8
, pp. 11883-11915
-
-
Saxena, N.1
Choi, B.J.2
-
9
-
-
77249138261
-
Smart-grid security issues
-
Feb.
-
H. Khurana, M. Hadley, N. Lu, D. A. Frincke, "Smart-grid security issues," IEEE Security Privacy, vol. 8, no. 1, pp. 81-85, Feb. 2010.
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.1
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
10
-
-
84902287084
-
An efficient Merkletree-based authentication scheme for smart grid
-
Jun.
-
H. Li, R. Lu, L. Zhou, B. Yang, X. Shen, "An efficient Merkletree-based authentication scheme for smart grid," IEEE Syst. J., vol. 8, no. 2, pp. 655-662, Jun. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.2
, pp. 655-662
-
-
Li, H.1
Lu, R.2
Zhou, L.3
Yang, B.4
Shen, X.5
-
11
-
-
84902282428
-
Efficient authentication and key management mechanisms for smart grid communications
-
Jun.
-
H. Nicanfar, P. Jokar, K. Beznosov, V. C. M. Leung, "Efficient authentication and key management mechanisms for smart grid communications," IEEE Syst. J., vol. 8, no. 2, pp. 629-640, Jun. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.2
, pp. 629-640
-
-
Nicanfar, H.1
Jokar, P.2
Beznosov, K.3
Leung, V.C.M.4
-
12
-
-
84860863989
-
A secure and privacy-preserving communication scheme for advanced metering infrastructure
-
Columbia, SC, USA, Jan.
-
P. Deng and L. Yang, "A secure and privacy-preserving communication scheme for advanced metering infrastructure," in Proc. IEEE PES Innov. Smart Grid Technol., Columbia, SC, USA, Jan. 2012, pp. 1-5.
-
(2012)
Proc IEEE PES Innov. Smart Grid Technol.
, pp. 1-5
-
-
Deng, P.1
Yang, L.2
-
13
-
-
84872071020
-
Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid
-
Dec.
-
H. Liu, H. Ning, Y. Zhang, L. T. Yang, "Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart grid," IEEE Trans. Smart Grid, vol. 3, no. 4, pp. 1722-1733, Dec. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.4
, pp. 1722-1733
-
-
Liu, H.1
Ning, H.2
Zhang, Y.3
Yang, L.T.4
-
14
-
-
84896869451
-
Efficiency-fairness trade-off in privacypreserving autonomous demand side management
-
Mar.
-
Z. Baharlouei and M. Hashemi, "Efficiency-fairness trade-off in privacypreserving autonomous demand side management," IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 799-808, Mar. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.2
, pp. 799-808
-
-
Baharlouei, Z.1
Hashemi, M.2
-
15
-
-
84906995292
-
Achieving multi-authority access control with efficient attribute revocation in smart grid
-
Sydney, NSW, Australia, Jun.
-
D. Liu, H. Li, Y. Yang, H. Yang, "Achieving multi-authority access control with efficient attribute revocation in smart grid," in Proc. IEEE Commun. Inf. Syst. Secur. Symp., Sydney, NSW, Australia, Jun. 2014, pp. 634-639.
-
(2014)
Proc IEEE Commun. Inf. Syst. Secur. Symp.
, pp. 634-639
-
-
Liu, D.1
Li, H.2
Yang, Y.3
Yang, H.4
-
16
-
-
84875055639
-
A decentralized security framework for data aggregation and access control in smart grids
-
Mar.
-
S. Ruj and A. Nayak, "A decentralized security framework for data aggregation and access control in smart grids," IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 196-205, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 196-205
-
-
Ruj, S.1
Nayak, A.2
-
17
-
-
82155185229
-
Petri net modeling of cyber-physical attacks on smart grid
-
Dec.
-
T. M. Chen, J. C. Sanchez-Aarnoutse, J. Buford, "Petri net modeling of cyber-physical attacks on smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 741-749, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 741-749
-
-
Chen, T.M.1
Sanchez-Aarnoutse, J.C.2
Buford, J.3
-
18
-
-
82155185205
-
Distributed Internet-based load altering attacks against smart power grids
-
Dec.
-
A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed Internet-based load altering attacks against smart power grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 667-674
-
-
Mohsenian-Rad, A.-H.1
Leon-Garcia, A.2
-
19
-
-
84903274319
-
Local load redistribution attacks in power systems with incomplete network information
-
Jul.
-
X. Liu and Z. Li, "Local load redistribution attacks in power systems with incomplete network information," IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1665-1676, Jul. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.4
, pp. 1665-1676
-
-
Liu, X.1
Li, Z.2
-
20
-
-
82155196441
-
Anomaly detection for cybersecurity of the substations
-
Dec.
-
C.-W. Ten, J. Hong, C.-C. Liu, "Anomaly detection for cybersecurity of the substations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865-873, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 865-873
-
-
Ten, C.-W.1
Hong, J.2
Liu, C.-C.3
-
21
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec.
-
O. Kosut, L. Jia, R. J. Thomas, L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
22
-
-
84875051849
-
Bad data injection attack and defense in electricity market using game theory study
-
Mar.
-
M. Esmalifalak, G. Shi, Z. Han, L. Song, "Bad data injection attack and defense in electricity market using game theory study," IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 160-169, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 160-169
-
-
Esmalifalak, M.1
Shi, G.2
Han, Z.3
Song, L.4
-
23
-
-
84883303602
-
Smart grid data integrity attacks
-
Sep.
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, K. Poolla, "Smart grid data integrity attacks," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1244-1253, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1244-1253
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
24
-
-
82155166373
-
Defending synchrophasor data networks against traffic analysis attacks
-
Dec.
-
B. Sikdar and J. H. Chow, "Defending synchrophasor data networks against traffic analysis attacks," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 819-826, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 819-826
-
-
Sikdar, B.1
Chow, J.H.2
-
25
-
-
84894595275
-
Man-in-the-middle attack test-bed investigating cybersecurity vulnerabilities in smart grid SCADA systems
-
Hangzhou, China Sep.
-
Y. Yang et al., "Man-in-the-middle attack test-bed investigating cybersecurity vulnerabilities in smart grid SCADA systems," in Proc. SUPERGEN, Hangzhou, China, Sep. 2012, pp. 1-8.
-
(2012)
Proc. SUPERGEN
, pp. 1-8
-
-
Yang, Y.1
-
26
-
-
84876937823
-
Denial-of-service (DoS) attacks on load frequency control in smart grids
-
Washington, DC, USA, Feb.
-
S. Liu, X. P. Liu, A. El Saddik, "Denial-of-service (DoS) attacks on load frequency control in smart grids," in Proc. IEEE PES Innov. Smart Grid Technol., Washington, DC, USA, Feb. 2013, pp. 1-6.
-
(2013)
Proc IEEE PES Innov. Smart Grid Technol.
, pp. 1-6
-
-
Liu, S.1
Liu, X.P.2
El Saddik, A.3
-
27
-
-
84856189389
-
Access control in distributed systems: Merging theory with practice
-
Changsha, China, Nov.
-
I. Stojmenovic, "Access control in distributed systems: Merging theory with practice," in Proc. IEEE TrustCom, Changsha, China, Nov. 2011, pp. 1-2.
-
(2011)
Proc IEEE TrustCom
, pp. 1-2
-
-
Stojmenovic, I.1
-
28
-
-
52349115962
-
Rolebased model security access control for smart power-grids computer networks
-
Pittsburgh, PA, USA, Jul.
-
H. Cheung, A. Hamlyn, T. Mander, C. Yang, R. Cheung, "Rolebased model security access control for smart power-grids computer networks," in Proc. IEEE PES General Meeting, Pittsburgh, PA, USA, Jul. 2008, pp. 1-7.
-
(2008)
Proc IEEE PES General Meeting
, pp. 1-7
-
-
Cheung, H.1
Hamlyn, A.2
Mander, T.3
Yang, C.4
Cheung, R.5
-
29
-
-
84883377107
-
Role-based access control model supporting regional division in smart grid System
-
Tainan, Taiwan Jun.
-
D. Rosic, U. Novak, S. Vukmirovic, "Role-based access control model supporting regional division in smart grid System," in Proc. ICCICSN, Tainan, Taiwan, Jun. 2013, pp. 197-201.
-
(2013)
Proc. ICCICSN
, pp. 197-201
-
-
Rosic, D.1
Novak, U.2
Vukmirovic, S.3
-
30
-
-
79952934001
-
Device authentication mechanism for smart energy home area networks
-
Las Vegas, NV, USA, Jan.
-
B. Vaidya, D. Makrakis, H. T. Mouftah, "Device authentication mechanism for smart energy home area networks," in Proc. IEEE ICCE, Las Vegas, NV, USA, Jan. 2011, pp. 787-788.
-
(2011)
Proc IEEE ICCE
, pp. 787-788
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
31
-
-
79957887926
-
Secure, intuitive and low-cost device authentication for smart grid networks
-
Las Vegas, NV, USA, Jan.
-
E. Ayday and S. Rajagopal, "Secure, intuitive and low-cost device authentication for smart grid networks," in Proc. IEEE CCNC, Las Vegas, NV, USA, Jan. 2011, pp. 1161-1165.
-
(2011)
Proc IEEE CCNC
, pp. 1161-1165
-
-
Ayday, E.1
Rajagopal, S.2
-
32
-
-
84872840926
-
Device authentication protocol for smart grid systems using homomorphic hash
-
Dec.
-
Y.-S. Kim and J. Heo, "Device authentication protocol for smart grid systems using homomorphic hash," J. Commun. Netw., vol. 14, no. 6, pp. 606-613, Dec. 2012.
-
(2012)
J. Commun. Netw.
, vol.14
, Issue.6
, pp. 606-613
-
-
Kim, Y.-S.1
Heo, J.2
-
33
-
-
84906689288
-
Cyber-physical device authentication for the smart grid electric vehicle ecosystem
-
Jul.
-
A. C.-F. Chan and J. Zhou, "Cyber-physical device authentication for the smart grid electric vehicle ecosystem," IEEE J. Sel. Areas Commun., vol. 32, no. 7, pp. 1509-1517, Jul. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.7
, pp. 1509-1517
-
-
Chan, A.C.-F.1
Zhou, J.2
-
34
-
-
84899943934
-
A security mechanism of smart grid AMI network through smart device mutual authentication
-
Jan.
-
S. Lee, J. Bong, S. Shin, Y. Shin, "A security mechanism of smart grid AMI network through smart device mutual authentication," in Proc. ICOIN, Phuket, Thailand, Jan. 2014, pp. 592-595.
-
(2014)
Proc. ICOIN, Phuket, Thailand
, pp. 592-595
-
-
Lee, S.1
Bong, J.2
Shin, S.3
Shin, Y.4
-
35
-
-
84910634929
-
Robust multi-factor authentication for fragile communications
-
Nov./Dec.
-
X. Huang, Y. Xiang, E. Bertino, J. Zhou, L. Xu, "Robust multi-factor authentication for fragile communications," IEEE Trans. Dependable Secure Comput., vol. 11, no. 6, pp. 568-581, Nov./Dec. 2014.
-
(2014)
IEEE Trans. Dependable Secure Comput.
, vol.11
, Issue.6
, pp. 568-581
-
-
Huang, X.1
Xiang, Y.2
Bertino, E.3
Zhou, J.4
Xu, L.5
-
36
-
-
80054052519
-
A secure smart-metering protocol over powerline communication
-
Oct.
-
S. Kim et al., "A secure smart-metering protocol over powerline communication," IEEE Trans. Power Del., vol. 26, no. 4, pp. 2370-2379, Oct. 2011.
-
(2011)
IEEE Trans. Power Del.
, vol.26
, Issue.4
, pp. 2370-2379
-
-
Kim, S.1
-
37
-
-
84893542369
-
Encryption key management for secure communication in smart advanced metering infrastructures
-
Vancouver, BC, Canada Oct.
-
S.-H. Seo, X. Ding, E. Bertino, "Encryption key management for secure communication in smart advanced metering infrastructures," in Proc. SmartGridComm, Vancouver, BC, Canada, Oct. 2013, pp. 498-503.
-
(2013)
Proc. SmartGridComm
, pp. 498-503
-
-
Seo, S.-H.1
Ding, X.2
Bertino, E.3
-
38
-
-
52349085128
-
Secure authentication for DNP3
-
Pittsburgh, PA, USA, Jul.
-
G. Gilchrist, "Secure authentication for DNP3," in Proc. IEEE PES General Meeting, Pittsburgh, PA, USA, Jul. 2008, pp. 1-3.
-
(2008)
Proc IEEE PES General Meeting
, pp. 1-3
-
-
Gilchrist, G.1
-
39
-
-
84856951875
-
Provisioning substation-level authentication in the smart grid networks
-
Baltimore, MD, USA Nov.
-
B. Vaidya, D. Makrakis, H. Mouftah, "Provisioning substation-level authentication in the smart grid networks," in Proc. Military Commun. Conf., Baltimore, MD, USA, Nov. 2011, pp. 1189-1194.
-
(2011)
Proc. Military Commun. Conf.
, pp. 1189-1194
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
-
40
-
-
84891425678
-
SCAPACH: Scalable password-changing protocol for smart grid device authentication
-
Nassau, Bahamas, Jul./Aug.
-
R. Tabassum, K. Nahrstedt, E. Rogers, K.-S. Lui, "SCAPACH: Scalable password-changing protocol for smart grid device authentication," in Proc. 22nd ICCCN, Nassau, Bahamas, Jul./Aug. 2013, pp. 1-5.
-
(2013)
Proc. 22nd ICCCN
, pp. 1-5
-
-
Tabassum, R.1
Nahrstedt, K.2
Rogers, E.3
Lui, K.-S.4
-
41
-
-
84878378211
-
ABAC and RBAC: Scalable, flexible, auditable access management
-
May/Jun.
-
E. Coyne and T. R. Weil, "ABAC and RBAC: Scalable, flexible, auditable access management," IT Prof., vol. 15, no. 3, pp. 14-16, May/Jun. 2013.
-
(2013)
IT Prof.
, vol.15
, Issue.3
, pp. 14-16
-
-
Coyne, E.1
Weil, T.R.2
-
42
-
-
84872248542
-
A role-based administration model for attributes
-
Minneapolis, MN, USA Sep.
-
X. Jin, R. Krishnan, R. Sandhu, "A role-based administration model for attributes," in Proc. WSRAS, Minneapolis, MN, USA, Sep. 2012, pp. 7-12.
-
(2012)
Proc. WSRAS
, pp. 7-12
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.3
-
44
-
-
77954639466
-
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
-
May/Jun.
-
D. M. Freeman, "Converting pairing-based cryptosystems from composite-order groups to prime-order groups," in Proc. 29th EUROCRYPT, May/Jun. 2010, pp. 44-61.
-
(2010)
Proc. 29th EUROCRYPT
, pp. 44-61
-
-
Freeman, D.M.1
-
45
-
-
84958765355
-
ID-based blind signature and ring signature from pairings
-
Dunedin, New Zealand Dec.
-
F. Zhang and K. Kim, "ID-based blind signature and ring signature from pairings," in Proc. ASIACRYPT, Dunedin, New Zealand, Dec. 2002, pp. 533-547.
-
(2002)
Proc. ASIACRYPT
, pp. 533-547
-
-
Zhang, F.1
Kim, K.2
-
46
-
-
54249121607
-
-
Ph.D. dissertation Dept. Comput. Sci., Stanford Univ [Online]. Available
-
B. Lynn, "On the implementation of pairing-based cryptosystems," Ph.D. dissertation, Dept. Comput. Sci., Stanford Univ., 2007. [Online]. Available: https://crypto.stanford.edu/pbc/thesis.pdf
-
(2007)
On the Implementation of Pairing-based Cryptosystems
-
-
Lynn, B.1
-
47
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Santa Barbara, CA, USA Aug.
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. CRYPTO, Santa Barbara, CA, USA, Aug. 2001, pp. 213-229.
-
(2001)
Proc. CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
48
-
-
84903208270
-
EasySMS: A protocol for end-to-end secure transmission of SMS
-
Jul.
-
N. Saxena and N. S. Chaudhari, "EasySMS: A protocol for end-to-end secure transmission of SMS," IEEE Trans. Inf. Forensics Security, vol. 9, no. 7, pp. 1157-1168, Jul. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.7
, pp. 1157-1168
-
-
Saxena, N.1
Chaudhari, N.S.2
-
49
-
-
78751657441
-
ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks
-
Jan.
-
J.-L. Huang, L.-Y. Yeh, H.-Y. Chien, "ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks," IEEE Trans. Veh. Technol., vol. 60, no. 1, pp. 248-262, Jan. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.1
, pp. 248-262
-
-
Huang, J.-L.1
Yeh, L.-Y.2
Chien, H.-Y.3
-
50
-
-
84963968072
-
-
SmartGridware IEC61850 Java Software Solutions. [Online]. Available accessed Mar. 12, 2015
-
SmartGridware IEC61850 Java Software Solutions. [Online]. Available: http://www.smartgridware.com, accessed Mar. 12, 2015.
-
-
-
-
51
-
-
23944524767
-
-
Standards Efficient Cryptogr., Certicom Res., Tech. Rep [Online]. Available
-
"SEC1: Elliptic curve cryptography," Standards Efficient Cryptogr., Certicom Res., Tech. Rep., 2000. [Online]. Available: http://www.secg.org/SEC1-Ver-1.0.pdf
-
(2000)
SEC1: Elliptic Curve Cryptography
-
-
-
52
-
-
84964867179
-
-
Nov. 13 [Online]. Available
-
(Nov. 13, 2014). Measuring Mobile Broadband Performance in the UK. [Online]. Available: http://stakeholders.ofcom.org.uk/binaries/research/broadband-research/mbb-nov14.pdf
-
(2014)
Measuring Mobile Broadband Performance in the UK
-
-
-
53
-
-
35048832038
-
-
CMG Finance B.V. [Online]
-
J. Wessels. (2001). Applications of BAN-logic. CMG Finance B.V. [Online]. http://www.win.tue.nl/ipa/archive/springdays2001/banwessels. pdf
-
(2001)
Applications of BAN-logic
-
-
Wessels, J.1
|