1 |
M. Klonowski and M. Kutylowski and M. Ren and K. Rybarczyk, "Forward-Secure Key Evolution in Wireless Sensor Networks", CANS, Springer-Verlag (LNCS 4856), 2007, pp. 102-120
DOI
ScienceOn
|
2 |
D.K. Nilsson, T. Roosta, U. Lindqvist and A. Valdes, "Key Management and Secure Software Updates in Wireless Process Control Environments", Proceedings of the first ACM conference on Wireless network security (WiSec '08), March 31-April 2, 2008, Alexandria, VA, pp.100-108
DOI
|
3 |
S. Mauw, I. van Vessem, and B. Bos, "Forward Secure Communication in Wireless Sensor Networks", Third International Conference Security in Pervasive Computing (SPC'06), Springer-Verlag (LNCS 3934), 2006, pp.32-42
DOI
ScienceOn
|
4 |
L. Pietre-Cambacedes and P. Sitbon, "Cryptographic Key Management for SCADA Systems-Issues and Perspectives", International Journal of Security and its Applications, Vol.2, No.3, 2008, pp. 31-40
|
5 |
C. Beaver, D. Gallup, W. Neumann, and M. Torgerson, "Key Management for SCADA", Technical Report SAND2001-3252, Sandia National Laboratories - Cryptography and Information Systems Surety Department, March 2002
|
6 |
R. McClanahan, "SCADA and IP: Is Network Convergence Really Here?", Industry Applications Magazine, IEEE, 2003, pp.29-36
DOI
ScienceOn
|
7 |
R. Dawson and C. Boyd and E. Dawson and J.G. Nieto, "SKMA: a Key Management Architecture for SCADA Systems", ACSW Frontiers 2006, pp.183-192
|
8 |
D. Park, "A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA", Journal of The Korea Society of Digital Industry & Information Management, Vol.3, No.2, June, 2009, pp. 98-106
|