Denial of Service Attack on Protocols for Smart Grid Communications
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. A Pairing-free ID-based Key Agreement Protocol with Different PKGs , 2014 .
[2] Sherali Zeadally,et al. Key management solutions in the smart grid environment , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).
[3] Gary A. Kildall,et al. A unified approach to global program optimization , 1973, POPL.
[4] Swapnoneel Roy,et al. Energy Oriented Vulnerability Analysis on Authentication Protocols for CPS , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.
[5] Swapnoneel Roy,et al. On vulnerability analysis of several password authentication protocols , 2015, Innovations in Systems and Software Engineering.
[6] Dejan J. Sobajic,et al. Artificial Neural-Net Based Dynamic Security Assessment for Electric Power Systems , 1989, IEEE Power Engineering Review.
[7] Wei-Chi Ku,et al. Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..
[8] Lih-Chyau Wuu,et al. Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..
[9] Neetesh Saxena,et al. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid , 2015 .
[10] Fan Wu,et al. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity , 2015, Secur. Commun. Networks.
[11] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[12] Huei-Ru Tseng,et al. A secure and privacy-preserving communication protocol for V2G networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[13] Yu Li,et al. Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication , 2011, 30th IEEE International Performance Computing and Communications Conference.
[14] Yongge Wang,et al. Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.
[15] Christos Xenakis,et al. Self-organised Key Management for the Smart Grid , 2015, ADHOC-NOW.
[16] Victor C. M. Leung,et al. Efficient Authentication and Key Management Mechanisms for Smart Grid Communications , 2014, IEEE Systems Journal.
[17] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[18] Kevin I.-J. Ho,et al. An S/Key-like One-Time Password Authentication Scheme Using Smart Cards for Smart Meter , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.
[19] Gary McGraw,et al. Static Analysis for Security , 2004, IEEE Secur. Priv..
[20] Swapnoneel Roy,et al. Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols , 2014, IACR Cryptol. ePrint Arch..
[21] H. C. Tsai,et al. Stolen-Verifier Attack on an Efficient Smartcard-Based One-Time Password Authentication Scheme , 2004 .
[22] Yacine Challal,et al. eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid , 2015, TrustCom 2015.
[23] Alejandro Russo,et al. Dynamic vs. Static Flow-Sensitive Security Analysis , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.