A Security Mechanism for Automation Control in PLC-based Networks
暂无分享,去创建一个
Choong Seon Hong | Joon Heo | Duck Hwa Hyun | Seong Ho Ju | Yong Hun Lim | Bum Suk Lee | Seong-ho Ju | C. Hong | Joon Heo | Yong-hun Lim | B. Lee | D. Hyun
[1] T. Tran-Quoc,et al. Distribution network modeling for power line communication applications , 2005, International Symposium on Power Line Communications and Its Applications, 2005..
[2] A. Treytl,et al. Practical issues on key distribution in power line networks , 2005, 2005 IEEE Conference on Emerging Technologies and Factory Automation.
[3] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[4] Robert Glenn,et al. Test Cases for HMAC-MD5 and HMAC-SHA-1 , 1997, RFC.
[5] A. Treytl,et al. Security architecture for power-line metering system , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..
[6] Alex Biryukov,et al. Data Encryption Standard (DES) , 2005, Encyclopedia of Cryptography and Security.
[7] Michael Rosing,et al. Implementing elliptic curve cryptography , 1998 .
[8] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[9] T. Sauter,et al. Security concept for a wide-area low-bandwidth power-line communication system , 2005, International Symposium on Power Line Communications and Its Applications, 2005..
[10] Ross J. Anderson,et al. Protecting domestic power-line communications , 2006, SOUPS '06.
[11] Choong Seon Hong,et al. Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.