On the use of one-way chain based authentication protocols in secure control systems
暂无分享,去创建一个
[1] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[2] Chris J. Mitchell. Remote User Authentication Using Public Information , 2003, IMACC.
[3] Markus Jakobsson,et al. Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.
[4] Bogdan Groza,et al. Using One-Way Chains to Provide Message Authentication without Shared Secrets , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[5] B. Groza,et al. Using the Discrete Squaring Function in the Delayed Message Authentication Protocol , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).
[6] Marc Fischlin. Fast Verification of Hash Chains , 2004, CT-RSA.
[7] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[8] Tamer Basar,et al. Optimal control of LTI systems over unreliable communication links , 2006, Autom..
[9] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[10] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[11] Craig Metz,et al. A One-Time Password System , 1996, RFC.
[12] Markus Jakobsson,et al. Fractal hash sequence representation and traversal , 2002, Proceedings IEEE International Symposium on Information Theory,.
[13] James D. Gilsinn,et al. IT Security for Industrial Control Systems: Requirements Specification and Performance Testing Presented at the 2004 NDIA Homeland Security Symposium & Exhibition Hyatt Regency, Crystal City, Virginia, May 25-27, 2004 , 2004 .
[14] Bruno Crispo,et al. Individual Authentication in Multiparty Communications , 2002, Comput. Secur..
[15] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[16] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[17] Roland S. Burns,et al. Advanced control engineering , 2001 .
[18] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[19] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[20] Charalampos Manifavas,et al. A new family of authentication protocols , 1998, OPSR.
[21] Yaron Sella. On The Computation-Storage Trade-Offs of Hash Chain Traversal , 2003, Financial Cryptography.
[22] Hung-Yu Chien,et al. Robust and Simple Authentication Protocol , 2003, Comput. J..