23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22-18 Industrial Communication Systems<br />

[R49] R. Shirey, Internet Security Glossary, Version 2, RFC 4949, Internet Engineering Task Force (IETF)<br />

Network Working Group, Fermont, CA, 2007.<br />

[RSA] R. L. Rivest, A. Shamir, and K. Adleman, A method for obtaining digital signatures and public-key<br />

crypto<strong>systems</strong>, Communications of the ACM, 21(2), 120–126, 1978.<br />

[SAF] J. Massey, SAFER K-64: A byte-oriented block-ciphering algorithm, Lecture Notes in Computer<br />

Science, 809, 1–17, 1994.<br />

[SC1] C. Schwaiger and A. Treytl, Smart card based security for fieldbus <strong>systems</strong>, in Proceedings of Ninth<br />

IEEE Conference on Emerging Technologies and Factory Automation, Catania, Italy, pp. 398–406, 2003.<br />

[SC2] C. Schwaiger and T. Sauter, Security strategies for field area networks, in 28th Annual Conference of<br />

the IEEE Industrial Electronics Society, Sevilla, Spain, pp. 2915–2920, 2002.<br />

[SHA] National Institute of Standards and Technology, Secure Hash Standard, FIPS PUB 180–2,<br />

Gaithersburg, MD, 2002.<br />

[TLS] T. Dierks and K. Resorla, The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246, 2008.<br />

[TR1] A. Treytl, T. Sauter, and C. Schwaiger, Security measures in automation <strong>systems</strong>—A practiceoriented<br />

approach, in Proceedings of 11th IEEE Conference of Emerging Technologies and Factory<br />

Automation, Catania, Italy, September 19–22, 2005.<br />

[TR2] A. Treytl, T. Sauter, H. Adamcyk, S. Ivanov, and S. H. Tresk, Security concepts for flexible wireless<br />

automation in real-time environments, in Proceedings of IEEE Conference on Emerging Technologies<br />

and Factory Automation 2009, Palma de Mallorca, Spain, pp. 1–8, 2009.<br />

[TUO] A. Tuomas, N. Pekka, and L. Jussipekka, DOS resistant authentication with client puzzles, in<br />

Proceedings of Eighth International Workshop on Security Protocols, Cambridge, U.K., pp. 170–177,<br />

April 3–5, 2000.<br />

[WEI] B. Weiss, Authentication under denial-of-service attacks, in Proceedings of IASTED Conference on<br />

Communications and Computer Networks, Boston, MA, pp. 134–139, November 2002.<br />

[ZIG] ZigBee Specification 2007, ZigBee Alliance, San Ramon, CA, 2007.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!