Author:
Nguyen Dao Truong,Le My Tu
Publisher
Springer International Publishing
Reference13 articles.
1. Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Trans. Commun. E85–B(5), 1050–1051 (2002)
2. Maynard, P., McLaughlin, K., Haberler, B.: Towards understanding man-in-the-middle attacks on IEC 60870-5-104 SCADA networks. In: Proceedings of the 2nd International Symposium for ICS and SCADA Cyber Security Research (2014)
3. Sherman, A.-T., McGrew, D.-A.: Key establishment in large dynamic groups using one-way function trees. IEEE Trans. Softw. Eng. 29(5), 444–458 (2003)
4. Balenson, D., McGrew, D., Sherman, A.: Key Management For Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. Internet Research Task Force (2000)
5. Wallner, D.-M., Harder, E.-J., Agee, R.-C.: Key Management for Multicast: Issues and Architectures. Internet Engineering Task Force (1998)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Industrial Network Protection by SDN-Based IPS with AI;Communications in Computer and Information Science;2020