Keyphrases
Asymmetric Key
16%
Computational Power
16%
Computational Resources
16%
Confidentiality
16%
Cryptographic Techniques
33%
Cyber Threats
16%
Cyber-attacks
33%
Data Acquisition Network
16%
Data Acquisition System
100%
Effective Solutions
16%
Field Devices
16%
Hash Chaining
16%
Hashing
16%
High Availability
16%
High Integrity
16%
High Scalability
16%
Industrial Control Systems
16%
Industrial Infrastructure
16%
Industrial Organization
16%
Industrial Plant
16%
Key Management Mechanism
16%
Layered Framework
16%
Lightweight Cryptography
16%
Message Authentication Code
16%
Microcontroller
16%
Multicast
16%
Multilevel Security
100%
Network Capability
16%
Point-to-point Communication
16%
Prime Number Generator
16%
Processing Information
16%
Random number Generation
16%
Request-response
16%
Response Mechanism
16%
Safety Implications
16%
Security Features
16%
Security Framework
100%
Session Key
16%
Session Key Establishment
16%
Supervisory Control
100%
Symmetric Cryptography
16%
Symmetric Key
16%
Vernam Cipher
16%
Computer Science
Authentication
33%
Computational Power
33%
Computational Resource
33%
Cryptographic Technique
33%
Cyber Attack
66%
Effective Solution
33%
High Availability
33%
Industrial Control System
33%
Information Processing
33%
Key Management
100%
Lightweight Cryptography
33%
Message Authentication Code
33%
Microcontroller
33%
Multicasting
33%
Multilayered Security
100%
Number Generator
33%
Perform Operation
33%
Point-to-Point Communication
33%
Random Number Generation
33%
Security Feature
33%
Security Framework
100%
Supervisory Control and Data Acquisition System
100%
Symmetric Key Cryptography
33%