Security Analysis of Multilayer SCADA Protocols.
Janica EdmondsMauricio PapaSujeet ShenoiPublished in: Critical Infrastructure Protection (2007)
Keyphrases
- security analysis
- authentication protocol
- key exchange
- security properties
- mutual authentication
- secure electronic
- security requirements
- public key
- high security
- smart card
- security model
- user authentication
- image encryption
- key management
- elliptic curve cryptography
- encryption scheme
- authentication scheme
- encryption algorithm
- key distribution
- secret key
- security protocols
- private key
- security services
- cryptographic protocols