Cited By
View all- Esiner ETefek UMashima DChen BKalbarczyk ZNicol D(2023)Message Authentication and Provenance Verification for Industrial Control SystemsACM Transactions on Cyber-Physical Systems10.1145/36071947:4(1-28)Online publication date: 14-Oct-2023
- Kohnhäuser FBüscher NKatzenbeisser SKim JAhn GKim SKim YLopez JKim T(2018)SALADProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196544(329-342)Online publication date: 29-May-2018
- Ferrag MMaglaras LArgyriou AKosmanos DJanicke H(2018)Security for 4G and 5G cellular networksJournal of Network and Computer Applications10.1016/j.jnca.2017.10.017101:C(55-82)Online publication date: 1-Jan-2018
- Show More Cited By