Cyber Physical Security for Industrial Control Systems and IoT
暂无分享,去创建一个
[1] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] SeongHan Shin,et al. A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[4] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[5] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[6] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[7] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[8] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] SeongHan Shin,et al. Protocols for purpose-restricted anonymous communications in IP-based wireless networks , 2008, Comput. Commun..
[10] N. Geethanjali,et al. Secure Authenticated Key Exchange Protocol for Credential Services , 2009 .
[11] SeongHan Shin,et al. Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Ichiro Koshijima,et al. Safety securing approach against cyber-attacks for process control system , 2013, Comput. Chem. Eng..
[13] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[14] Kazukuni Kobara,et al. Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints , 2014, IWSEC.
[15] Kazukuni Kobara,et al. Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays , 2014, J. Inf. Process..
[16] Yohei Hori,et al. Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.
[17] Tsutomu Matsumoto,et al. IoTPOT: Analysing the Rise of IoT Compromises , 2015, WOOT.
[18] N. Weitzel. The Year in Review 2014 , 2015, Seminars in cardiothoracic and vascular anesthesia.