Security Encryption Schemes for Internet SCADA: Comparison of the Solutions.
Rosslin John RoblesMaricel O. BalitanasTai-Hoon KimPublished in: SUComS (2011)
Keyphrases
- encryption scheme
- security model
- standard model
- security analysis
- cca secure
- public key
- public key encryption
- diffie hellman
- key management
- secret sharing scheme
- secret key
- cyber security
- ciphertext
- public key cryptosystem
- encryption algorithm
- security requirements
- access control
- security mechanisms
- encryption key
- private key
- information security
- security issues
- intrusion detection
- hash functions
- smart card
- critical infrastructure
- data sharing
- identity based encryption
- wireless sensor networks