Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP
暂无分享,去创建一个
B. Groza | P.-S. Murvay | I. Silea | T. Ionica | B. Groza | Pal-Stefan Murvay | I. Silea | T. Iônica
[1] Bogdan Groza,et al. Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[2] Marc Fischlin. Fast Verification of Hash Chains , 2004, CT-RSA.
[3] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[4] James D. Gilsinn,et al. IT Security for Industrial Control Systems: Requirements Specification and Performance Testing Presented at the 2004 NDIA Homeland Security Symposium & Exhibition Hyatt Regency, Crystal City, Virginia, May 25-27, 2004 , 2004 .
[5] Toma-Leonida Dragomir,et al. On the use of one-way chain based authentication protocols in secure control systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[6] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[7] Bruno Crispo,et al. Individual Authentication in Multiparty Communications , 2002, Comput. Secur..
[8] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[9] Markus Jakobsson,et al. Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.
[10] Bogdan Groza,et al. Using One-Way Chains to Provide Message Authentication without Shared Secrets , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[11] Yaron Sella. On The Computation-Storage Trade-Offs of Hash Chain Traversal , 2003, Financial Cryptography.
[12] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[13] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[14] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .