Steganography based Low Complexity Authentication Scheme for Synchrophasor Communication
暂无分享,去创建一个
[1] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[2] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking , 2008 .
[3] Stevan Šandi,et al. pyPMU — Open source python package for synchrophasor data transfer , 2016, 2016 24th Telecommunications Forum (TELFOR).
[4] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[5] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[6] S. Han,et al. A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[7] Mourad Debbabi,et al. Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.
[8] Thoshitha T. Gamage,et al. Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication , 2016, IEEE Transactions on Smart Grid.
[9] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[10] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[11] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[12] Yo-Sung Ho,et al. Reversiblee Image Authentication Based on Watermarking , 2006, 2006 IEEE International Conference on Multimedia and Expo.
[13] Chin-Chen Chang,et al. Lossless Data Hiding Based on Histogram Modification for Image Authentication , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[14] Kumar Parasuraman,et al. Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).
[15] Sushmita Ruj,et al. A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids , 2013, IEEE Transactions on Smart Grid.
[16] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[17] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[18] Min Wu,et al. Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.
[19] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[20] C. Ern. Information hiding techniques for steganography and digital watermarking , 2018 .
[21] Ibrahim Khalil,et al. Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings , 2015, Inf. Syst..
[22] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[23] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[24] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[25] Xiaodong Lin,et al. MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.
[26] Lin Zhu,et al. A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..
[27] Gene Tsudik,et al. QUEST Software and , 2022 .
[28] Richard Brooks,et al. A survey of electric power synchrophasor network cyber security , 2014, IEEE PES Innovative Smart Grid Technologies, Europe.
[29] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[30] Göran N Ericsson,et al. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.
[31] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[32] Edmund Y. Lam,et al. Zero-Configuration Identity-Based Signcryption Scheme for Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[33] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[34] L. Mili,et al. A study of communication and power system infrastructure interdependence on PMU-based wide area monitoring and protection , 2012, 2012 IEEE Power and Energy Society General Meeting.
[35] Sakir Sezer,et al. IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation , 2016, ICISSP.
[36] Randy L. Ekl,et al. Smart Grid security technology , 2010, 2010 Innovative Smart Grid Technologies (ISGT).