Secure remote access to Smart Energy Home area Networks
暂无分享,去创建一个
[1] Johannes Wolkerstorfer,et al. Coupon Recalculation for the GPS Authentication Scheme , 2008, CARDIS.
[2] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[3] Martín Abadi,et al. A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.
[4] Jacques Stern,et al. On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order , 2006, Journal of Cryptology.
[5] Paul C. van Oorschot,et al. Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.
[6] Sitaraman Lakshminarayanan. Authentication and authorization for Smart Grid application interfaces , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[7] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[8] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Mark R. Tuttle,et al. A Semantics for a Logic of Authentication , 1991, PODC 1991.
[10] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Dimitrios Makrakis,et al. Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[12] F.M. Cleveland,et al. Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[13] Rob Shein. Security Measures for Advanced Metering Infrastructure Components , 2010, 2010 Asia-Pacific Power and Energy Engineering Conference.