Towards Formally Verified Key Management for Industrial Control Systems
暂无分享,去创建一个
[1] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[2] Nadeem Javaid,et al. Fog Computing Over IoT: A Secure Deployment and Formal Verification , 2017, IEEE Access.
[3] Pieter J. Mosterman,et al. Cyber-physical systems challenges: a needs analysis for collaborating embedded software systems , 2016, Software & Systems Modeling.
[4] Yee Wei Law,et al. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.
[5] Stamatis Karnouskos,et al. Architecting the next generation of service-based SCADA/DCS system of systems , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[6] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[7] Roopa Vishwanathan,et al. Expiration and Revocation of Keys for Attribute-Based Signatures , 2015, DBSec.
[8] Robert F. Mills,et al. A Method for Revealing and Addressing Security Vulnerabilities in Cyber-physical Systems by Modeling Malicious Agent Interactions with Formal Verification , 2016 .
[9] Stephen Haunts. Key Storage and Azure Key Vault , 2019 .
[10] Nils Ole Tippenhauer,et al. Towards Formal Security Analysis of Industrial Control Systems , 2017, AsiaCCS.
[11] Huaikou Miao,et al. Formal verification of security protocols using Spin , 2016, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS).