Publications

Share:

Managing secrets is essential for securing critical infrastructure
Exploring the security eco-system for critical infrastructure
Why critical infrastructure needs both asynchronous and synchronous components
Building the security ecosystem for critical infrastructure
Encryption: The answer to all security
Managing data lifecycle for critical infrastructure
The need for time-based security in critical infrastructure
Establishing trust in distributed critical infrastructure micro devices
Can information from embedded systems be trusted?
Why We Need Veterans for Critical Infrastructure Security
Designing security that matches critical infrastructure needs
Creating a security management model for critical infrastructure
Security management gateways for critical infrastructure
Defining security management areas for critical infrastructure
Smart Grid Clash of Titans
Smart management is the key to smart grid meter security
Using a cryptographic IC for key management and logistical support
Protect Firmware from Counterfeiting
CryptoAuthentication Product Uses