Login / Signup
Authenticated encryption for time-sensitive critical infrastructure.
Daniel Hunter
Jack Parry
Kenneth Radke
Colin J. Fidge
Published in:
ACSW (2017)
Keyphrases
</>
critical infrastructure
key exchange
cyber security
control system
cyber defense
information security
homeland security
data acquisition
smart grid
cyber attacks
business continuity
risk analysis
encryption scheme
access control
risk management
intrusion detection
data processing
risk assessment
data management