1 |
M. Xie and L. Wang, "One-round identity-based key exchange with perfect forward security," Inf. Process. Lett. 2012, 112(14), pp.587-591.
DOI
|
2 |
S.S. Vivek, S.S.D. Selvi, L.R. Venkatesan, and C.P. Rangan, Proceedings of the ProvSec, in: LNCS, vol. 8209, Springer-Verlag, 2013, pp.38-58
|
3 |
H. Sun, Q. Wen, H. Zhang, and Z. Jin, "A strongly secure identity-based authenticated key agree- ment protocol without pairings under the GDH assumption," Secur Comm. Netw., 2015, 8(17), pp.3167-3179.
DOI
|
4 |
L. Ni, G. Chen, J. Li, and Y. Hao, "Strongly secure identity-based authenticated key agreement protocols without bilinear pairings," Inform Sciences., 2016, Vol.367, pp.176-193.
|
5 |
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Comput. Syst., 1990, Vol.8, No.1, pp.18-36.
DOI
|
6 |
오중타잉.최태영, "A Robust Three-Factor User Authentication Scheme based on Elliptic Curve Cryptography and Fuzzy Extractor," 정보과학회논문지, 제46권, 제6호, 2019, pp.587-597.
|
7 |
B. Cheryl, G. Donald, N. William and T. Mark, "Key management for SCADA," Sandia National Laboratory, Mar. 2002.
|
8 |
R. Dawson, C. Boyd, E. Dawson, and J. Nieto, "SKMA: A Key Management Architecture for SCADA Systems," 4th Australasian Information Secur- ity Workshop, 2006.
|
9 |
J. Gao, J. Liu, and B. Rajan, "SCADA communication and security issues," Security and Communication Networks, 2014, 7(1), pp.175-194.
DOI
|
10 |
A. Rezai, P. Keshvarzi, and Z. Moravej, "Secure SCADA communication by using a modified key management scheme," ISA Trans., 2013, 52(4), pp.517-524.
DOI
|
11 |
D. Boneh and M. Franklin, "Identity-Based encryption from the Weil pairing," SIAM Journal of Computing, 2003, Vol.32, No.3, pp.586-615.
DOI
|
12 |
B. Lynn, "Authenticated Identity-Based Encryption," available at http://eprint.iacr.org/2002/72, 2002.
|
13 |
D.H. Choi, H.M. Kim, D.H. Won, and S.J. Kim, "Advanced Key Management Architecture for Secure SCADA Communications," IEEE Trans. Power Deliv., 2009, 24(3), pp.1154-1163
DOI
|
14 |
L. Dang, J. Xu, X. Cao, H. Li, J. Chen, Y. Zhang, and X. Fu, "Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks," Int. J. Distrib. Sensor Netw., 2018, 14(4), pp.1-17.
|
15 |
오두환.최두식.나은성.김상철.하재철, "ID기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안," 정보보호학회논문지, 제2권, 제3호, 2012, pp.427-437.
|
16 |
A. Rezai, P. Keshavarzi, and Z. Moravej, "Key management issue in SCADA networks: a review," Eng. Sci. Technol., Int. J., 20(1), 2017, pp.354-363.
DOI
|
17 |
L. Martirano, M. Kermani, F. Manzo, A. Bayatma- koo, and U. Graselli, "Implementation of SCADA Systems for a Real Microgrid Lab Testbed," In Proceedings of 2019 IEEE Milan PowerTech, Italy, 2019, pp.1-6.
|