Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/9879
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kılınç, Görkem | - |
dc.contributor.author | Nai Fovino, Igor | - |
dc.date.accessioned | 2021-01-24T18:28:55Z | - |
dc.date.available | 2021-01-24T18:28:55Z | - |
dc.date.issued | 2013 | - |
dc.identifier.isbn | 978-364241484-8 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.issn | 1611-3349 | - |
dc.identifier.uri | https://doi.org/10.1007/978-3-642-41485-5_11 | - |
dc.identifier.uri | https://hdl.handle.net/11147/9879 | - |
dc.description.abstract | The security of the ICT (Information Communications Technology) components of industrial systems is gaining great importance in the context of their criticality for society at large. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to such threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of a effective key management infrastructure supporting a cryptographic layer. In this paper we present the first working prototype of a distributed key generation infrastructure for SCADA systems based on the well known identity based crypto-paradigm. © 2013 Springer-Verlag. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Distributed private key generation | en_US |
dc.subject | Identity based cryptography | en_US |
dc.subject | Key management | en_US |
dc.subject | SCADA protocols | en_US |
dc.subject | SCADA security | en_US |
dc.title | Distributed identity based private key generation for SCADA systems | en_US |
dc.type | Conference Object | en_US |
dc.institutionauthor | Kılınç, Görkem | - |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.volume | 7722 LNCS | en_US |
dc.identifier.startpage | 118 | en_US |
dc.identifier.endpage | 129 | en_US |
dc.identifier.scopus | 2-s2.0-84893062439 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1007/978-3-642-41485-5_11 | - |
dc.relation.doi | 10.1007/978-3-642-41485-5_11 | en_US |
dc.coverage.doi | 10.1007/978-3-642-41485-5_11 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | Q3 | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
1
checked on Nov 15, 2024
Page view(s)
102
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.