Skip to search formSkip to main contentSkip to account menu

Link encryption

Known as: Bulk encryption, Multiplex link encryption 
Link encryption is an approach to communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-­‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-­‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-­‐12 Documents .................................................................................................. 20 
2013
2013
In this paper, we introduce a new scheme based on the hardness of factoring integers of the shape ��=�� 2 �� . Our scheme uses a… 
2012
2012
A new asymmetric cryptosystem based on the Integer Factorization Problem is proposed. It posses an encryption and decryption… 
2009
2009
Spam filters that are implemented using Naïve Bayesian learning techniques are widely deployed worldwide with email clients such… 
2007
2007
  • L. Bao
  • 2007
  • Corpus ID: 137475
Anonymity in ad hoc network routing came as a means to hide the identification information of nodes, traffic, paths and network… 
2006
2006
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated… 
2005
2005
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing… 
2004
2004
Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing… 
1997
1997
This study looks at the data communicationsnetwork management organization (NMO) within alarge financial institution and…