Skip to search formSkip to main contentSkip to account menu

Link encryption

Known as: Bulk encryption, Multiplex link encryption 
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-­‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-­‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-­‐12 Documents .................................................................................................. 20 
2014
2014
- In this era of technological advancements, to avoid the misuse of confidential information and misuse by the unauthorized… 
2013
2013
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a… 
2012
2012
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption… 
2012
2012
The main objective of this paper is to detect the existence of secr et information hidden within an image. Cryptography is one of… 
2009
2009
– Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services… 
2009
2009
Spam filters that are implemented using Naïve Bayesian learning techniques are widely deployed worldwide with email clients such… 
2005
2005
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing… 
2004
2004
The evolution of a cipher has no practical impact if it has only a theoretical background. Every encryption algorithm should… 
2004
2004
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…