Author:
CHERIFI Tarek,HAMAMI Lamia
Subject
Information Systems and Management,Computer Science Applications,Safety, Risk, Reliability and Quality,Modelling and Simulation
Reference31 articles.
1. C. Alcaraz and S. Zeadally, Critical infrastructure protection: Requirements and challenges for the 21st century, International Journal of Critical Infrastructure Protection, vol. 8, pp. 53–66, 2015.
2. M. Bellare, T. Kohno, S. Lucks, N. Ferguson, B. Schneier, D. Whiting, J. Callas and J. Walker, Provable Security Support for the Skein Hash Family, version 1.0 (www.skein-hash.info/sites/default/files/skein-proofs.pdf), 2009.
3. L. Blum, M. Blum and M. Shub, A simple unpredictable pseudorandom number generator, SIAM Journal on Computing vol. 15(2), pp. 364–383, 1986.
4. S. Chang, R. Perlner, W. Burr, M. Turan, J. Kelsey, S. Paul and L. Bassham, Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition, NISTIR 7896, National Institute of Standards and Technology, Gaithersburg, Maryland, 2012.
5. G. Clarke, D. Reynders and E. Wright Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems Newnes, Oxford, United Kingdom, 2004.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献