Please view the copyright notices at the bottom of this page prior to downloading any papers.
In proceedings of the NIST Workshop on Cybersecurity for Cyber-Physical Systems, April 23-24, 2012, Gaithersburg, MD. [NIST Workshop entry]
Smart Grid Communications and Networking, edited by E. Hossain, Z. Han, H.V. Poor, Cambridge University Press, 2012. [Cambridge Catalogue entry]
1st Workshop on Secure Control Systems (SCS), April 12, 2010, Stockholm, Sweden.
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies (ISGT), Gaithersburg, Maryland, Jan. 19-21, 2010.1 [IEEE Xplore entry]
Proceedings of the International Conference on Information System Security, p. 110, LNCS vol. 4812, 2007. [SpringerLink entry]
IEEE Power and Energy Magazine, vol.10, no.1, pp.67-73, Jan.-Feb. 2012.1 [IEEE Xplore entry]
Attribute-Based Messaging: Access Control and Confidentiality. ACM Trans. Inf. Syst. Secur. 13, 4, Article 31 (December 2010), 35 pages.2 [ACM Digital Library entry]
Proceedings of the 4th International Symposium on Information, Computer, & Communications Security (ASIACCS), Sydney, Australia, March 10-12, 2009, pp. 262-275.2 [ACM Digital Library entry]
Proceedings of the IEEE PES Power Systems Conference & Exposition (PSCE), Seattle, Washington, March 15-18, 2009.1 [IEEE Xplore entry]
In Proceedings of the Forty-Third Annual Hawaii International Conference on System Sciences, Honolulu, Hawaii, January 5-8, 2010.1 [Tags: 2010, authentication, authentication protocol principles, Author: Agarwal, P., Author: Bobba, R., Author: Heine, E., Author: Khurana, H., Author: Yardley, T., cyber-infrastructure, power grid
In Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), January 2012.1 [IEEE CS entry]
In proceedings of the 2012 IEEE Power and Energy Conference at Illinois (PECI), pp. 1-8, 24-25 Feb. 2012.1 [IEEE Xplore entry]
in IEEE Transactions on Smart Grid, vol. 3, no. 4, December 2012, pp. 1790-1799.1 [IEEE Xplore entry]