{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T03:29:53Z","timestamp":1725420593957},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/etfa.2016.7733666","type":"proceedings-article","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T16:26:20Z","timestamp":1478535980000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["Multi-cast authentication framework for distributed control systems based on IEC 61499"],"prefix":"10.1109","author":[{"given":"Aydin","family":"Homay","sequence":"first","affiliation":[]},{"given":"Mario","family":"de Sousa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Information Technology- Security Techniques- Security Requirements for Cryptographic Modules","article-title":"ISO\/IEC","year":"2012","key":"ref10"},{"journal-title":"Information technology &#x2014; Security techniques &#x2014; Test requirements for cryptographic modules","article-title":"ISO\/IEC","year":"2014","key":"ref11"},{"key":"ref12","article-title":"Guide to Industrial Control Systems (ICS) security: Supervisory Control and Data Acquisition (SCADA) systems","author":"stouffer","year":"2011","journal-title":"Distributed Control systems (DCS) and other control system configurations such as Programmable Logic Controllers (PLC) recommendations of the National Institute of Standards and Technology Computer security Gaithersburg MD U S Department of Commerce National Institute of Standards and Technology"},{"key":"ref13","article-title":"Rea-time execution for IEC 61499","author":"zoitl","year":"2008","journal-title":"International Society of Automation"},{"journal-title":"Pass Rafael A Course in Cryptography (PDF) retrieved","year":"2015","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_14"},{"journal-title":"Software-Optimized Universal Hashing and Message Authentication UNIVERSITY OF CALIFORNIA DAVIS","year":"2000","author":"krovetz","key":"ref16"},{"journal-title":"Modern Operating Systems","year":"2008","author":"tanenbaum","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"ref19","first-page":"121","article-title":"The Egyptian Journal of Remote Sensing and Space Sciences","year":"2011","journal-title":"New multicast authentication protocol for entrusted members using advanced encryption standard"},{"journal-title":"BBC News Worm brings down coastguard PCs systems Coastguard stations around the UK have been severely disrupted after a computer worm brought down IT","year":"2016","key":"ref4"},{"article-title":"Official (ISC)2&#x00AE; guide to the CISSP&#x00AE; CBK&#x00AE;: Certified Information Systems Security Professional","year":"2015","author":"gordon","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2005.07.001"},{"journal-title":"ARC Advisory Group","article-title":"Risk Drives Industrial Control System. Cyber Security Investment","year":"2011","key":"ref5"},{"journal-title":"Network and system security IEC","article-title":"IEC, Industrial communication networks","year":"2013","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref2","article-title":"CyberCrime and Information Warfar, Australian Institute of Criminology","author":"grabosky","year":"2000","journal-title":"ACT"},{"journal-title":"Washington D C NTSB\/PAR-02\/02 PB2002-916502","article-title":"Pipeline Accident Report: Pipeline Rupture and Subsequent Fire in Bellingham, Washington June 10, 1999","year":"2002","key":"ref1"},{"journal-title":"Response to Request for Information","article-title":"NIST Cybersecurity Framework","year":"2013","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Software-Optimized Universal Hashing and Message Authentication","year":"2000","author":"krovetz","key":"ref21"}],"event":{"name":"2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2016,9,6]]},"location":"Berlin, Germany","end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7593665\/7733490\/07733666.pdf?arnumber=7733666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T07:02:28Z","timestamp":1480489348000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7733666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/etfa.2016.7733666","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}