Enhancing the Security of Multi-agent Networked Control Systems Using QKD based Homomorphic Encryption
暂无分享,去创建一个
Hai-Jin Ding | Re-Bing Wu | Qian-Chuan Zhao | Zi-Xiao Wang | R. Wu | Haijin Ding | Qian Zhao | Ziwei Wang
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] K. Najim,et al. Generalized predictive control based on neural networks , 1996, Neural Processing Letters.
[3] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[4] Iman Shames,et al. Secure and private control using semi-homomorphic encryption , 2017 .
[5] Quanyan Zhu,et al. Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies , 2012, 2012 5th International Symposium on Resilient Control Systems.
[6] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[7] Hyungbo Shim,et al. Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .
[8] Guangming Xie,et al. Controllability of a Leader–Follower Dynamic Network With Switching Topology , 2008, IEEE Transactions on Automatic Control.
[9] Tamer Basar,et al. Toward Optimal Network Topology Design for Fast and Secure Distributed Computation , 2014, GameSec.
[10] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[11] Md. Apel Mahmud,et al. Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems , 2017, IEEE Transactions on Industrial Informatics.
[12] Bruce Schneier,et al. Applied cryptography, second edition : protocols, algorithms,and source code in C , 2015 .
[13] Senchun Chai,et al. Design and stability analysis of networked control systems with random communication time delay using the modified MPC , 2006 .
[14] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .