{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:20:16Z","timestamp":1729617616995,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/ssic.2016.7571806","type":"proceedings-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T17:19:12Z","timestamp":1474564752000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Security authentication mechanism based on symmetric polynomials for SCADA systems"],"prefix":"10.1109","author":[{"given":"Yue","family":"Lu","sequence":"first","affiliation":[]},{"given":"Xiuzhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Changsong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1521","DOI":"10.1016\/j.ijepes.2009.03.004","article-title":"Proposal strategies of key management for data encryption in SCADA network of electric power systems","volume":"33","author":"kang","year":"2011","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"ref11","first-page":"1","article-title":"Survey of SCADA security challenges and potential attack vectors","author":"johnson","year":"0","journal-title":"Internet Technology and Secured Transactions (ICITST) 2010 International Conference for"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","article-title":"Dissecting a cyberwarfare weapon","volume":"9","author":"stuxnet","year":"2011","journal-title":"Security & Privacy IEEE"},{"key":"ref13","article-title":"An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks","author":"ali","year":"2015","journal-title":"ISC International Journal of Information Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0034-4877(74)90019-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2004.839556"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948119"},{"key":"ref17","first-page":"1","article-title":"Using model-based intrusion detection for SCADA networks","author":"cheung","year":"2007","journal-title":"Proceedings of the Scada Security Scientific Symposium"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.05.001"},{"key":"ref19","first-page":"19","article-title":"Implementation of Modbus Mode Communication Test Software Based on VC &#x2014; Modbus Serial and Modbus\/TCP Communication","author":"yan","year":"2008","journal-title":"Modern Electric Power"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/67.976986"},{"key":"ref3","first-page":"563","article-title":"Industrial control system","author":"paredes","year":"1982","journal-title":"U S Patent 4"},{"year":"2012","author":"lopez","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28920-0_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.03.001"},{"key":"ref7","first-page":"569","article-title":"SCADA system security: Complexity, history and new developments","author":"cai","year":"2008","journal-title":"Industrial Informatics INDIN 2008 6th IEEE International Conference on"},{"key":"ref2","first-page":"616","article-title":"System for remotely accessing an industrial control system over a commercial communications network","author":"papadopoulos","year":"2000","journal-title":"U S Patent"},{"key":"ref1","first-page":"16","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"stouffer","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMI.2011.6037717"},{"key":"ref21","first-page":"277","article-title":"Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter","author":"lu","year":"2002","journal-title":"Application-Specific Systems Architectures and Processors 2002 Proceedings The IEEE International Conference on"}],"event":{"name":"2016 International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC)","start":{"date-parts":[[2016,7,18]]},"location":"Paris, France","end":{"date-parts":[[2016,7,19]]}},"container-title":["2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7565236\/7571793\/07571806.pdf?arnumber=7571806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T21:23:10Z","timestamp":1657315390000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7571806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ssic.2016.7571806","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}