{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:05:11Z","timestamp":1730286311818,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/ntms.2019.8763839","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:25:18Z","timestamp":1563236718000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Authentication Layer for IEC 61113-3 Applications"],"prefix":"10.1109","author":[{"given":"Aydin","family":"Homay","sequence":"first","affiliation":[]},{"given":"Christos","family":"Chrysoulas","sequence":"additional","affiliation":[]},{"given":"Mario","family":"de Sousa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Simatic Net Manual CP 342&#x2013;5","year":"2001","journal-title":"N&#x00FC;rnberg"},{"key":"ref11","article-title":"MODERN OPERATING SYSTEMS Other bestselling titles by Andrew S. Tanenbaum Structured Computer Organization","author":"tanenbaum","year":"2009","journal-title":"Operating Systems Design and Implementation"},{"key":"ref12","first-page":"310","author":"krawczyk","year":"2001","journal-title":"The Order of Encryption and Authentication for Protecting Communications (or How Secure Is SSL?)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2172\/1030885"},{"journal-title":"InfoSec Reading Room Secure Architecture for Industrial Control Systems","year":"2015","author":"obregon","key":"ref14"},{"key":"ref15","article-title":"IEC 62443: Industrial Network and System Security","author":"phinney","year":"2006","journal-title":"(Isa)"},{"key":"ref16","article-title":"Mechanisms to provide integrity in SCADA and PCS devices *","author":"shah","year":"2008","journal-title":"Int Work Cyber-Physical Syst - Challenges Appl (CPS-CA &#x2019;08)"},{"journal-title":"Authentication secures industrial sensor networks","year":"2015","author":"sanogo","key":"ref17"},{"key":"ref18","volume":"2010","author":"draft","year":"2011","journal-title":"Draft International Standard Iso \/ Iec Fdis"},{"key":"ref19","first-page":"216","author":"black","year":"1999","journal-title":"UMAC Fast and Secure Message Authentication"},{"key":"ref4","article-title":"Institute For Security Technology Studies","author":"billo","year":"2004","journal-title":"Cyber Warfare an Analysis of the Means and Motivations of"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.002"},{"key":"ref3","first-page":"36","author":"abrams","year":"2007","journal-title":"Bellingham Control System Cyber Security Case Study"},{"journal-title":"W32 stuxnet Dossier","year":"2011","author":"falliere","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FTC.2016.7821724"},{"key":"ref8","article-title":"Guide to Industrial Control Systems (ICS) Security Recommendations of the National Institute of Standards and Technology","volume":"800","author":"stouffer","year":"2008","journal-title":"NIST Spec Publ"},{"journal-title":"DCS or PLC Seven Questions to Help You Select the Best Solution","first-page":"12","year":"2007","key":"ref7"},{"key":"ref2","first-page":"192","article-title":"Critical foundations: Protecting America&#x00B4;s infrastructure","author":"marsh","year":"1997","journal-title":"Comm Crit Infrastruct Prot"},{"journal-title":"IEC 61131-3 Programming Industrial Automation Systems Second","year":"0","author":"john","key":"ref9"},{"key":"ref1","article-title":"Multicast Authentication Framework for Distributed Control Systems based on IEC 61499","author":"homay","year":"2016","journal-title":"Emerging Technologies and Factory Automation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejrs.2011.11.003"},{"key":"ref21","first-page":"13","article-title":"New real time multicast authentication protocol","volume":"12","author":"abdellatif","year":"2011","journal-title":"Int J Netw Secur"},{"journal-title":"Programmable Logic Control (PLC) Solutions Guide","year":"2015","author":"instruments","key":"ref24"},{"key":"ref23","volume":"8979","author":"reconfigurable","year":"2011","journal-title":"FreeForm PC104 Reconfigurable Digital IO with Counter Timers"},{"key":"ref26","first-page":"144","article-title":"Better than BIBA: short one-time signatures with fast signing and verifying","author":"reyzin","year":"2002","journal-title":"Proceedings of the 7th Australian Conference on Information Security and Privacy"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"}],"event":{"name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2019,6,24]]},"location":"CANARY ISLANDS, Spain","end":{"date-parts":[[2019,6,26]]}},"container-title":["2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8758829\/8763770\/08763839.pdf?arnumber=8763839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:14:35Z","timestamp":1657854875000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8763839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ntms.2019.8763839","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}