{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:45:58Z","timestamp":1764402358264,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_4","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T11:26:42Z","timestamp":1163590002000},"page":"50-59","source":"Crossref","is-referenced-by-count":29,"title":["A Security Analysis of the Precise Time Protocol (Short Paper)"],"prefix":"10.1007","author":[{"given":"Jeanette","family":"Tsang","sequence":"first","affiliation":[]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"A Precision Clock Synchronization Protocol for Networked Measurement and Control Systems, IEEE Standard 1588-2002 (November 2002)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bishop, M.: A Security Analysis of the NTP Protocol Version 2. In: Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, AZ, USA, December 3-7, pp. 20\u201329 (1990)","DOI":"10.1109\/CSAC.1990.143746"},{"key":"4_CR3","unstructured":"Doyle, P.: Introduction to Real-Time Ethernet II. The Extension\u2014A Technical Supplement to Control Network\u00a05(4) (July-August 2004), available: www.ccontrols.com\/pdf\/Extv5n4.pdf"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Eidson, J., Fischer, M.C., White, J.: IEEE-1588 Standard for a precision clock synchronization protocol for networked measurement and control systems. In: Proceedings of the 34th Annual Precise Time and Time Interval Systems and Applications Meeting, Reston, Virginia, December 3-5 (2002)","DOI":"10.1109\/SFICON.2002.1159815"},{"key":"4_CR5","unstructured":"Mohl, D.: IEEE 1588-Precise Time Synchronization as the Basis for Real Time Application in Automation, available: www.industrialnetworking.com\/support\/general_faqs_info\/Precise_Time_Sync.pdf"},{"key":"4_CR6","unstructured":"IEC, Precision clock synchronization protocol for networked measurement and control systems, IEC 61588, 1st edn., p. 158 (2004)"},{"key":"4_CR7","unstructured":"NTP: Network Time Protocol, available: www.ntp.org"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S1363-4127(01)00106-6","volume":"5","author":"N. Dunbar","year":"2001","unstructured":"Dunbar, N.: IPsec Networking Standards\u2014An Overview. Information Security Technical Report\u00a05(1), 35\u201348 (2001)","journal-title":"Information Security Technical Report"},{"key":"4_CR9","unstructured":"Harris, K.R., Balasubramanian, S., Moldovansky, A.: The Application of IEEE 1588 to a Distributed Motion Control System. In: ODVA CIP Networks Conference, November 16-18 (2004)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Gaderere, G., Sauter, T., Bumiller, G.: Clock Synchronization in Powerline Networks. In: Proceedings of International Symposium on Power Line Communications and Its Application, pp. 71\u201375 (2005)","DOI":"10.1109\/ISPLC.2005.1430468"},{"key":"4_CR11","first-page":"512","volume-title":"The Hacker\u2019s Handbook","author":"J.B. Hansen","year":"2004","unstructured":"Hansen, J.B., Young, S.: The Hacker\u2019s Handbook, p. 512. CRC Press, Boca Raton (2004)"},{"key":"4_CR12","unstructured":"Tsang, J., Beznosov, K.: A Security Analysis of the Precise Time Protocol. LERSSE technical report, Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, LERSSE-TR-2006-02, p. 20 (October 2005), http:\/\/lersse-dl.ece.ubc.ca"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:14:37Z","timestamp":1736637277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11935308_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}