1. Aoki , K. et al 2001 Specification of Camellia - A 128-Bit Block Cipher
2. Beaver , C. et al 2002 Key management for SCADA
3. Brown , M. et al 2000 PGP in Constrained Wireless Devices
4. Cárdenas , A.a. Amin , S. Sastry , S. 2008 Secure Control: Towards Survivable Cyber-Physical Systems
5. Carman , D.W. Kruus , P.S. Matt , B.J. 2000 Constraints and Approaches for Distributed Sensor Network Security . NAI Labs Technical Report #00-010