Owner of the document requires that the content be not remodified or redistributed.
Share |



Information-Theoretic Approach to Authentication Codes for Power System Communications
Author:
T. Matsumoto, T. Kobayashi, S. Katayama, K. Fukushima, and K. Sekiguchi
Year:
2010
Abstract:

This is a presentation from the 2010 IEEE PES Transmission & Distribution Conference & Exposition Program. The presentation displays that A-codes are suitable for power system applications using real-time performance, are secure against risk in terms of advancing computing power and aging cryptography algorithms and have the attributes of ease of implementation and verification.

Document Type:
Slide presentation
Source:
IEEE PES