메뉴 건너뛰기




Volumn 2, Issue 4, 2011, Pages 759-769

A secure framework for protecting customer collaboration in intelligent power grids

Author keywords

Electricity market; ID based cryptography; security; smart grid

Indexed keywords

BI-DIRECTIONAL FLOWS; CUSTOMER COLLABORATION; ELECTRIC POWER; ELECTRICITY MARKET; ID-BASED CRYPTOGRAPHY; INTELLIGENT POWER; PERFORMANCE EVALUATION; POWER CUSTOMERS; POWER INFRASTRUCTURES; POWER USAGE; RANDOM ORACLE MODEL; SECURITY; SECURITY ATTACKS; SECURITY ISSUES; SECURITY MODEL; SECURITY SCHEME; SMART GRID;

EID: 82155197148     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2011.2160662     Document Type: Article
Times cited : (18)

References (21)
  • 3
    • 82155180700 scopus 로고    scopus 로고
    • Security issues, challenges and solutions in the smart grid
    • submitted for publication
    • H. Son, H. Kim, J. Roh, and J. Park, "Security issues, challenges and solutions in the smart grid," KIEE J. Electr. Eng. Technol., 2011, submitted for publication.
    • (2011) KIEE J. Electr. Eng. Technol.
    • Son, H.1    Kim, H.2    Roh, J.3    Park, J.4
  • 4
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Adv. Cryptol., 1985, pp. 47-53.
    • (1985) Proc. Adv. Cryptol. , pp. 47-53
    • Shamir, A.1
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Adv. Cryptol.-CRYPTO 2001, pp. 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 35048835319 scopus 로고    scopus 로고
    • Secure identity based encryption without random oracles
    • D. Boneh and X. Boyen, "Secure identity based encryption without random oracles," in Proc. Adv. Cryptol.-CRYPTO 2004, pp. 443-459.
    • (2004) Proc. Adv. Cryptol.-CRYPTO , pp. 443-459
    • Boneh, D.1    Boyen, X.2
  • 7
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters, "Efficient identity-based encryption without random oracles," in Proc. Adv. Cryptol.-EUROCRYPT 2005, pp. 114-127. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1
  • 8
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • C. Cocks, "An identity based encryption scheme based on quadratic residues," in Proc. 8th IMA Int. Conf. Cryptography Coding, 2001, pp. 360-363.
    • (2001) Proc. 8th IMA Int. Conf. Cryptography Coding , pp. 360-363
    • Cocks, C.1
  • 9
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. Adv. Cryptol.-EUROCRYPT 2005, pp. 457-473. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 10
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol. 85, no. 2, pp. 441-444, 2000.
    • (2000) Phys. Rev. Lett. , vol.85 , Issue.2 , pp. 441-444
    • Shor, P.1    Preskill, J.2
  • 11
    • 84943807207 scopus 로고    scopus 로고
    • Toward secure key distribution in truly ad-hoc networks
    • A. Khalili, J. Katz, and W. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," in Proc. SAINTWorkshops, 2003, pp. 342-346.
    • (2003) Proc. SAINTWorkshops , pp. 342-346
    • Khalili, A.1    Katz, J.2    Arbaugh, W.3
  • 15
    • 0037194815 scopus 로고    scopus 로고
    • ID-based signatures from pairings on elliptic curves
    • K. Paterson, "ID-based signatures from pairings on elliptic curves," Electron. Lett., vol. 38, no. 18, pp. 1025-1026, 2002.
    • (2002) Electron. Lett. , vol.38 , Issue.18 , pp. 1025-1026
    • Paterson, K.1
  • 17
    • 85053572525 scopus 로고    scopus 로고
    • Kepco Kepco Rep. [Online]
    • Kepco, "Statistics of electric power in Korea," Kepco Rep., 2010 [Online]. Available: http://www.kepco.co.kr
    • (2010) Statistics of Electric Power in Korea
  • 18
    • 82155180702 scopus 로고    scopus 로고
    • [Online]
    • Kepco [Online]. Available: http://www.kepco.co.kr
    • Kepco
  • 20
    • 82155199061 scopus 로고    scopus 로고
    • [Online]
    • Shamus Software [Online]. Available: http://www.shamus.ie/index. php?page=benchmarks
    • Shamus Software
  • 21
    • 38549176356 scopus 로고    scopus 로고
    • SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
    • DOI 10.1109/ICC.2007.263, 4288934, 2007 IEEE International Conference on Communications, ICC'07
    • Y. Kim, W. Ren, J. Jo, Y. Jiang, and J. Zheng, "SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography," in Proc. IEEE Int. Conf. Commun. 2007 (ICC'07), pp. 1570-1575. (Pubitemid 351145759)
    • (2007) IEEE International Conference on Communications , pp. 1570-1575
    • Kim, Y.1    Ren, W.2    Jo, J.-Y.3    Yang, M.4    Jiang, Y.5    Zheng, J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.