Cyber security analysis of the European train control system.
Igor LopezMarina AguadoPublished in: IEEE Commun. Mag. (2015)
Keyphrases
- security analysis
- control system
- public key
- smart card
- security requirements
- high security
- security model
- encryption scheme
- authentication protocol
- image encryption
- user authentication
- cyber security
- real time
- security properties
- mutual authentication
- proxy signature scheme
- critical infrastructure
- private key
- encryption algorithm
- intelligent agents
- information systems
- data mining