Secure communication mechanism for ubiquitous Smart grid infrastructure
暂无分享,去创建一个
[1] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[2] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[3] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[4] F.M. Cleveland,et al. Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[5] Rob Shein. Security Measures for Advanced Metering Infrastructure Components , 2010, 2010 Asia-Pacific Power and Energy Engineering Conference.
[6] Johannes Wolkerstorfer,et al. Coupon Recalculation for the GPS Authentication Scheme , 2008, CARDIS.
[7] Christoph Sorge,et al. A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.
[8] Paul C. van Oorschot,et al. Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.
[9] Lingfeng Wang,et al. Smart meters for power grid — Challenges, issues, advantages and status , 2011 .
[10] Dmitry Podkuiko,et al. Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.
[11] Jacques Stern,et al. On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order , 2006, Journal of Cryptology.
[12] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[13] S. Karnouskos,et al. Smart Houses for a Smart Grid , 2009 .
[14] Sitaraman Lakshminarayanan. Authentication and authorization for Smart Grid application interfaces , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[15] Nei Kato,et al. Towards a light-weight message authentication mechanism tailored for Smart Grid communications , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[16] Yu-Fang Chung,et al. ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.
[17] Lingfeng Wang,et al. Support vector machine based data classification for detection of electricity theft , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[18] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[19] Conversion and delivery of electrical energy in the 21st century , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[20] Lingfeng Wang,et al. Smart meters for power grid — Challenges, issues, advantages and status , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[21] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[22] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[23] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[24] Dimitrios Makrakis,et al. Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[25] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[26] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[27] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[28] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[29] Hamid Sharif,et al. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.