Securing dynamic microgrid partition in the smart grid
暂无分享,去创建一个
Changsheng Wan | Bei Pei | Changsong Chen | Vir Virander Phoha | Bei Pei | V. Phoha | C. Wan | Changsong Chen
[1] Yi Qian,et al. An advanced key management scheme for secure smart grid communications , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[2] Ran Canetti,et al. Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction , 2005, RFC.
[3] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[4] F. B. Hildebrand,et al. Introduction To Numerical Analysis , 1957 .
[5] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[6] Lin Zhu,et al. A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..
[7] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[8] Weidong Kou,et al. Efficient ID-based Signature Without Trusted PKG , 2007, IACR Cryptol. ePrint Arch..
[9] Yacine Challal,et al. eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[10] Identity Based Cryptography for Smart-grid Protection , 2015 .
[11] Shenxing Shi,et al. SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids , 2014, IEEE Transactions on Industrial Electronics.
[12] Nei Kato,et al. A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.
[13] Attila Altay Yavuz,et al. An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages , 2014, IEEE Transactions on Information Forensics and Security.
[14] Dapeng Wu,et al. Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.
[15] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[16] Victor C. M. Leung,et al. Efficient Authentication and Key Management Mechanisms for Smart Grid Communications , 2014, IEEE Systems Journal.
[17] Mohammad Hossein Yaghmaee,et al. A LIGHTWEIGHT MECHANISM FOR MUTUAL AUTHENTICATION IN SMART GRID , 2014 .
[18] Hamid Sharif,et al. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[19] Nei Kato,et al. Towards a light-weight message authentication mechanism tailored for Smart Grid communications , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[20] Peter E. Yee. Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2013, RFC.
[21] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[22] Victor C. M. Leung,et al. Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.
[23] Xinyu Yang,et al. On false data injection attacks against the dynamic microgrid partition in the smart grid , 2015, 2015 IEEE International Conference on Communications (ICC).
[25] Elisa Bertino,et al. Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[26] Edmund Y. Lam,et al. Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[27] Leonid Reyzin,et al. Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.
[28] Laurence T. Yang,et al. Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid , 2012, IEEE Transactions on Smart Grid.
[29] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[30] Qinghua Li,et al. Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.
[31] Sherali Zeadally,et al. Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy , 2014, IEEE Transactions on Information Forensics and Security.
[32] Mikhail Simonov. Dynamic Partitioning of DC Microgrid in Resilient Clusters Using Event-Driven Approach , 2014, IEEE Transactions on Smart Grid.
[33] Siddharth Sridhar,et al. Cyber-Physical System Security for the Electric Power Grid Controlinpowersystemsthatmaybevulnerabletosecurityattacksisdiscussedinthis paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations. , 2012 .
[34] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[35] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.