Restricted Authentication and Encryption for Cyber-physical Systems
暂无分享,去创建一个
[1] Anand R. Tripathi,et al. Context-aware role-based access control in pervasive computing systems , 2008, SACMAT '08.
[2] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[3] Trent Jaeger,et al. Attestation-based policy enforcement for remote access , 2004, CCS '04.
[4] Amos Fiat,et al. Zero Knowledge Proofs of Identity , 1987, STOC.
[5] Insup Lee,et al. Security Challenges in Next Generation Cyber Physical Systems , 2006 .
[6] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[7] Bart Preneel,et al. Remote attestation on legacy operating systems with trusted platform modules , 2008, Sci. Comput. Program..
[8] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[9] G.-J. Schrijen,et al. Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection , 2007, 2007 International Conference on Field Programmable Logic and Applications.
[10] Mikhail J. Atallah,et al. Binding software to specific native hardware in a VM environment: the puf challenge and opportunity , 2008, VMSec '08.
[11] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[12] Srinivas Devadas,et al. Controlled physical random functions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[13] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).