Experimental Validation of Encrypted Controller Implemented on Raspberry Pi
暂无分享,去创建一个
[1] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[2] Zhong-Hua Pang,et al. Secure transmission mechanism for networked control systems under deception attacks , 2011, 2011 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems.
[3] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[4] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[5] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Karl Henrik Johansson,et al. Cyberphysical Security in Networked Control Systems: An Introduction to the Issue , 2015 .
[8] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[9] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[10] F. Bullo,et al. Control-Theoretic Methods for Cyber-Physical Security , 2013 .
[11] Hiroaki Nishino,et al. Distributed Detection of Cyber Attacks and Faults for Power Systems , 2014 .
[12] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[13] Yoshizumi Serizawa,et al. Security technologies, usage and guidelines in SCADA system networks , 2009, 2009 ICCAS-SICE.
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.