{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:15:02Z","timestamp":1729624502609,"version":"3.28.0"},"reference-count":53,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/etfa.2017.8247636","type":"proceedings-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T22:42:04Z","timestamp":1515451324000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Towards trustworthy data in networked control systems: A hardware-based approach"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Ulz","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Pieber","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[]},{"given":"Rainer","family":"Matischek","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Bock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Speed Comparison of Popular Crypto Algorithms","year":"2009","author":"dai","key":"ref39"},{"key":"ref38","first-page":"19","article-title":"How to Break MD5 and Other Hash Functions","author":"wang","year":"2005","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887306"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2010.5530638"},{"journal-title":"Differential Cryptanalysis of the Data Encryption Standard","year":"2012","author":"biham","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2008.4758425"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2011.2160543"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2004.1260985"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.04.002"},{"key":"ref29","article-title":"Research Challenges for the Security of Control Systems","author":"c\u00e1rdenas","year":"2008","journal-title":"HOTSEC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/0471219282.eot346"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1983.10017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.905132"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/773453.808188"},{"key":"ref26","first-page":"1","article-title":"Tamper Resistance-a Cautionary Note","volume":"2","author":"anderson","year":"1996","journal-title":"Proceedings of the Second Usenix Workshop on Electronic Commerce"},{"key":"ref25","first-page":"145","article-title":"Cryptcoding-Encryption and Error-Correction Coding in a Single Step","author":"gligoroski","year":"2006","journal-title":"Security and Man-agement"},{"journal-title":"Computer-Aided Control System Design Using MATLAB","year":"1992","author":"shahian","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2178216"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1145\/996566.996771","article-title":"Security as a New Dimension in Embedded System Design","author":"kocher","year":"2004","journal-title":"Proceedings of the 41st Annual Design Automation Conference"},{"key":"ref52","first-page":"12","article-title":"Message Authentication using Hash Functions: The HMAC Construction","volume":"2","author":"bellare","year":"1996","journal-title":"RSA Laboratories Cryptobytes"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"ref11","first-page":"213","article-title":"The Myths and Facts behind Cyber Security Risks for Industrial Control Systems","volume":"116","author":"byres","year":"2004","journal-title":"Proceedings of the VDE Kongress"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2005.859486"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_41"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1109\/SFCS.1997.646128","article-title":"A Concrete Security Treatment of Symmetric Encryption","author":"bellare","year":"1997","journal-title":"Foundations of Computer Science 1997 Proceedings 38th Annual Symposium on"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2013","author":"daemen","key":"ref14"},{"key":"ref15","first-page":"322","article-title":"An FPGA Implementation of CCM Mode Using AES","author":"l\u00f3pez-trejo","year":"2005","journal-title":"International Conference on Information Security and Cryptology"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2010.5619894"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1147\/rd.282.0124"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5434378"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2012.06.037"},{"journal-title":"Recommendations for Implementing the Strategic Initiative INDUSTRIE 4 0 Securing the Future of German Manufacturing Industry Final Report of the Industrie 4 0 Working Group","year":"2013","author":"kagermann","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2004.837860"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2035462"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.07.017"},{"key":"ref7","first-page":"3551","article-title":"Stabilization of Networked Control Systems with Time-Varying Network-Induced Delay","volume":"4","author":"xie","year":"2004","journal-title":"Decision and Control 2004 CDC 43rd IEEE Conference on"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2003.1200240"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1996.568576"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1993.397441"},{"key":"ref48","first-page":"10","article-title":"Hardware-based solutions secure machine identities in smart factories","author":"haid","year":"2016","journal-title":"Boards & Solutions"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/1966913.1966959","article-title":"Attacks Against Process Control Systems: Risk Assessment, Detection, and Response","author":"c\u00e1rdenas","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9206-6"},{"key":"ref41","volume":"66","author":"cusick","year":"2004","journal-title":"Stream Ciphers and Number Theory"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7465"}],"event":{"name":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2017,9,12]]},"location":"Limassol","end":{"date-parts":[[2017,9,15]]}},"container-title":["2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8233358\/8247555\/08247636.pdf?arnumber=8247636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T13:43:03Z","timestamp":1693402983000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8247636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/etfa.2017.8247636","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}