{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:26:55Z","timestamp":1744086415409,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336775"},{"type":"electronic","value":"9783642336782"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33678-2_13","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T15:02:42Z","timestamp":1346943762000},"page":"149-160","source":"Crossref","is-referenced-by-count":1,"title":["Towards Secure Fieldbus Communication"],"prefix":"10.1007","author":[{"given":"Felix","family":"Wieczorek","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Krau\u00df","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Schiller","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Beckhoff Automation GmbH: FC1100 | PCI EtherCAT slave card (2011)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"Fast Software Encryption","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX Mode of Operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 389\u2013407. Springer, Heidelberg (2004)"},{"key":"13_CR3","unstructured":"Br\u00fchne, M.: IEEE 802.1n und WLAN-Controller \u2013 Lohnt der Einsatz auch in der Industrie. In: SPS\/IPC\/DRIVES: Elektrische Automatisierung, Systeme und Komponenten (2011)"},{"key":"13_CR4","unstructured":"Damm, M., Leitner, S.H., Mahnke, W., Leitner, S.H.: Security. In: OPC Unified Architecture, pp. 1\u201351. Springer (2009)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800-38C, NIST - Computer Security Resource Center (2007)","DOI":"10.6028\/NIST.SP.800-38c"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-39887-5_24","volume-title":"Fast Software Encryption","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 330\u2013346. Springer, Heidelberg (2003)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Granzer, W., Reinisch, C., Kastner, W.: Future Challenges for Building Automation: Wireless and Security. In: Proc. IEEE Int Industrial Electronics (ISIE) Symp., pp. 4415\u20134467 (2010)","DOI":"10.1109\/ISIE.2010.5637840"},{"issue":"1","key":"13_CR8","first-page":"86","volume":"2","author":"M. Hell","year":"2006","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain \u2013 A Stream Cipher for Constrained Environments. International Journal of Wireless and Mobile Computing, Special Issue on Security of Computer Network and Mobile Systems\u00a02(1), 86\u201393 (2006)","journal-title":"International Journal of Wireless and Mobile Computing, Special Issue on Security of Computer Network and Mobile Systems"},{"key":"13_CR9","unstructured":"IEC: IEC 61131-3, Programmable controllers \u2014 Part 3: Programming languages, 2 edn. (2003)"},{"key":"13_CR10","unstructured":"IEC: IEC 61158, Industrial communication networks \u2014 Fieldbus specifications, 2 edn. (2010)"},{"key":"13_CR11","unstructured":"IEEE: IEEE 802.15.4, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs) (2006)"},{"key":"13_CR12","unstructured":"ISA: ISA100.11a Wireless systems for industrial automation: Process control and related applications (2011)"},{"key":"13_CR13","unstructured":"Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. Discrete Mathematics and Its Applications, 5th printing edn. CRC Press, Inc. (1996)"},{"key":"13_CR14","unstructured":"Microsoft Corporation: Microsoft Visual Studio, Ultimate, version 10.0.4.0129.1 SP1Rel (2010)"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P. Rogaway","year":"2003","unstructured":"Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur.\u00a06, 365\u2013403 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Schwaiger, C., Treytl, A.: Smart Card Based Security for Fieldbus Systems. In: Proc. IEEE Conf. Emerging Technologies and Factory Automation ETFA 2003, vol.\u00a01, pp. 398\u2013406 (2003)","DOI":"10.1109\/ETFA.2003.1247734"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Szilagyi, C., Koopman, P.: Flexible Multicast Authentication for Time-Triggered Embedded Control Network Applications. In: DSN, pp. 165\u2013174. IEEE (2009)","DOI":"10.1109\/DSN.2009.5270342"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Treytl, A., Sauter, T., Schwaiger, C.: Security Measures for Industrial Fieldbus Systems \u2013 State of the Art and Solutions for IP-based Approaches. In: Proc. IEEE Int Factory Communication Systems Workshop, pp. 201\u2013209 (2004)","DOI":"10.1109\/WFCS.2004.1377709"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Treytl, A., Sauter, T., Schwaiger, C.: Security Measures in Automation Systems \u2013 a Practice-Oriented Approach. In: Proc. 10th IEEE Conf. Emerging Technologies and Factory Automation ETFA., vol.\u00a02, pp. 847\u2013855 (2005)","DOI":"10.1109\/ETFA.2005.1612762"},{"key":"13_CR20","unstructured":"Whiting, D., Schneier, B., Lucks, S., Muller, F.: Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive. Tech. rep., ECRYPT Stream Cipher Project Report 2005\/027 (2005)"},{"key":"13_CR21","unstructured":"Wirt, K.T.: ASC \u2013 A Stream Cipher with Built\u2013In MAC Functionality. World Academy of Science, Engineering and Technology\u00a029 (2007)"},{"key":"13_CR22","unstructured":"Wolf, M., Weimerskirch, A., Paar, C.: Security in Automotive Bus Systems. In: Proceedings of the Workshop on Embedded Security in Cars, ESCAR 2004 (2004)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Wolf, M., Weimerskirch, A., Wollinger, T.: State of the Art: Embedding Security in Vehicles. EURASIP Journal on Embedded Systems (2007)","DOI":"10.1186\/1687-3963-2007-074706"},{"key":"13_CR24","unstructured":"Wu, H., Preneel, B.: Differential-Linear Attacks against the Stream Cipher Phelix. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/056"},{"key":"13_CR25","volume-title":"Fast Software Encryption","author":"B. Zoltak","year":"2004","unstructured":"Zoltak, B.: VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme. In: Fast Software Encryption, Springer, Heidelberg (2004)"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"\u00c5gren, M., Hell, M., Johansson, T.: On Hardware-Oriented Message Authentication with Applications towards RFID. In: Lightweight Security Privacy: Devices, Protocols and Applications (LightSec), pp. 26\u201333. IEEE Computer Society (2011)","DOI":"10.1109\/LightSec.2011.9"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"\u00c5gren, M., Hell, M., Johansson, T., Meier, W.: A New Version of Grain-128 with Authentication. In: Symmetric Key Encryption Workshop. European Network of Excellence in Cryptology II (2011)","DOI":"10.1504\/IJWMC.2011.044106"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33678-2_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:26:16Z","timestamp":1744068376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33678-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336775","9783642336782"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33678-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}