Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,719,883 papers from all fields of science
Search
Sign In
Create Free Account
Link encryption
Known as:
Bulk encryption
, Multiplex link encryption
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Communications security
Encryption
End-to-end encryption
Multiplexing
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Using detection in depth to counter SCADA-specific advanced persistent threats
Garrett Hayes
2014
Corpus ID: 133929052
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-‐12 Documents .................................................................................................. 20
2014
2014
Image Encryption Based on Inter-Pixel Displacement
Ritu Siwatch
,
Veepin Kumar
,
H.O.D. Cse
2014
Corpus ID: 189859202
- In this era of technological advancements, to avoid the misuse of confidential information and misuse by the unauthorized…
Expand
2013
2013
A new efficient asymmetric cryptosystem based on the integer factorization problem of N=p2q
M. Ariffin
,
M. Asbullah
,
N. Abu
,
Z. Mahad
2013
Corpus ID: 265095965
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a…
Expand
2012
2012
A New Efficient Asymmetric Cryptosystem Based on the Integer Factorization Problem
M. Ariffin
2012
Corpus ID: 16829106
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption…
Expand
2012
2012
LZW DATA COMPRESSION FOR FSP ALGORITHM
C. Parthasarathy
,
G. Kalpana
,
V. Gnanachandran
,
K. Pin
2012
Corpus ID: 18004852
The main objective of this paper is to detect the existence of secr et information hidden within an image. Cryptography is one of…
Expand
2009
2009
Security Protocol Design: A Case Study Using Key Distribution Protocols
A. Jurcut
,
T. Coffey
,
R. Dojen
,
R. Gyorodi
2009
Corpus ID: 17522505
– Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services…
Expand
2009
2009
Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails
P. Gupta
,
A. Nagrale
,
S. Upadhyaya
2009
Corpus ID: 17478874
Spam filters that are implemented using Naïve Bayesian learning techniques are widely deployed worldwide with email clients such…
Expand
2005
2005
A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases
Ulf T. Mattsson
IEEE Congress on Evolutionary Computation
2005
Corpus ID: 4664574
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…
Expand
2004
2004
Bulk encryption crypto-processor for smart cards: design and implementation
N. Sklavos
,
G. Selimis
,
O. Koufopavlou
Proceedings of the 11th IEEE International…
2004
Corpus ID: 27882872
The evolution of a cipher has no practical impact if it has only a theoretical background. Every encryption algorithm should…
Expand
2004
2004
Transparent Encryption and Separation of Duties for Enterprise Databases - A Solution for Field Level Privacy in Databases
Ulf T. Mattsson
2004
Corpus ID: 59731717
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required