-
2
-
-
70449409371
-
A conceptual framework for the vehicle-to-grid (V2G) implementation
-
Guille, C., Gross, G.: A conceptual framework for the vehicle-to-grid (V2G) implementation. Energy Policy 37(11), 4379-4390 (2009)
-
(2009)
Energy Policy
, vol.37
, Issue.11
, pp. 4379-4390
-
-
Guille, C.1
Gross, G.2
-
3
-
-
34247587103
-
Using fleets of electric-drive vehicles for grid support
-
Tomic, J., Kempton, W.: Using fleets of electric-drive vehicles for grid support. Journal of Power Sources 168(2), 459-468 (2007)
-
(2007)
Journal of Power Sources
, vol.168
, Issue.2
, pp. 459-468
-
-
Tomic, J.1
Kempton, W.2
-
4
-
-
0010948617
-
-
Research Report UCD-ITS-RR-01-03, Institute of Transportation Studies, University of California June
-
Kempton, W., Tomic, J., Letendre, S., Brooks, A., Lipman, T.: Vehicle-to-grid power: Battery, hybrid, and fuel cell vehicles as resources for distributed electric power in california. Research Report UCD-ITS-RR-01-03, Institute of Transportation Studies, University of California (June 2001)
-
(2001)
Vehicle-to-grid Power: Battery, Hybrid, and Fuel Cell Vehicles As Resources for Distributed Electric Power in California
-
-
Kempton, W.1
Tomic, J.2
Letendre, S.3
Brooks, A.4
Lipman, T.5
-
5
-
-
77955132877
-
Secure wireless communication platform for EV-to-Grid research
-
Helmy, A., Mueller, P., Zhang, Y. (eds.) ACM
-
Guo, H., Yu, F., Wong, W.-C., Suhendra, V., Wu, Y.D.: Secure wireless communication platform for EV-to-Grid research. In: Helmy, A., Mueller, P., Zhang, Y. (eds.) IWCMC, pp. 21-25. ACM (2010)
-
(2010)
IWCMC
, pp. 21-25
-
-
Guo, H.1
Yu, F.2
Wong, W.-C.3
Suhendra, V.4
Wu, Y.D.5
-
7
-
-
84855834796
-
Privacy and the Smart Grid
-
Smart Grid Interoperability Panel - Cyber Security Working Group: Technical Report NISTIR 7628, National Institute of Standards and Technology August
-
Smart Grid Interoperability Panel - Cyber Security Working Group: Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid. Technical Report NISTIR 7628, National Institute of Standards and Technology (August 2010)
-
(2010)
Guidelines for Smart Grid Cyber Security
, vol.2
-
-
-
8
-
-
79954610963
-
SmartPrivacy for the Smart Grid: Embedding privacy into the design of electricity conservation
-
10.1007/s12394-010-0046-y
-
Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3, 275-294 (2010), 10.1007/s12394-010-0046-y
-
(2010)
Identity in the Information Society
, vol.3
, pp. 275-294
-
-
Cavoukian, A.1
Polonetsky, J.2
Wolf, C.3
-
9
-
-
18844440199
-
Vehicle-to-grid power implementation: From stabilizing the grid to supporting large-scale renewable energy
-
Kempton, W., Tomic, J.: Vehicle-to-grid power implementation: From stabilizing the grid to supporting large-scale renewable energy. Journal of Power Sources 144(1), 280-294 (2005)
-
(2005)
Journal of Power Sources
, vol.144
, Issue.1
, pp. 280-294
-
-
Kempton, W.1
Tomic, J.2
-
10
-
-
78650546506
-
Vehicle to Grid - Reference Architectures for the Control Markets in Sweden and Germany
-
IEEE October
-
Sandels, C., Franke, U., Ingvar, N., Nordström, L., Hamrén, R.: Vehicle to Grid - Reference Architectures for the Control Markets in Sweden and Germany. In: Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies Europe. IEEE (October 2010)
-
(2010)
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies Europe
-
-
Sandels, C.1
Franke, U.2
Ingvar, N.3
Nordström, L.4
Hamrén, R.5
-
11
-
-
67650312114
-
On the Anonymity of Home/Work Location Pairs
-
Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. Springer, Heidelberg
-
Golle, P., Partridge, K.: On the Anonymity of Home/Work Location Pairs. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390-397. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5538
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
12
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security and Privacy 7, 75-77 (2009)
-
(2009)
IEEE Security and Privacy
, vol.7
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
13
-
-
72149093212
-
Communication and control of electric drive vehicles supporting renewables
-
IEEE September
-
Markel, T., Kuss, M., Denholm, P.: Communication and control of electric drive vehicles supporting renewables. In: IEEE Vehicle Power and Propulsion Conference, VPPC 2009, pp. 27-34. IEEE (September 2009)
-
(2009)
IEEE Vehicle Power and Propulsion Conference, VPPC 2009
, pp. 27-34
-
-
Markel, T.1
Kuss, M.2
Denholm, P.3
-
14
-
-
79953022651
-
The evolving standardization landscape for electrically propelled vehicles
-
den Bossche, P.V., Mulders, F.V., Mierlo, J.V., Timmermans, J.M.: The evolving standardization landscape for electrically propelled vehicles. The World Electric Vehicle Journal 2(4), 41-48 (2008)
-
(2008)
The World Electric Vehicle Journal
, vol.2
, Issue.4
, pp. 41-48
-
-
Den Bossche, P.V.1
Mulders, F.V.2
Mierlo, J.V.3
Timmermans, J.M.4
-
15
-
-
56749120150
-
Mix- Zones for Location Privacy in Vehicular Networks
-
ACM, Vancouver
-
Freudiger, J., Raya, M., Félegyházi, M., Papadimitratos, P., Hubaux, J.P.: Mix- Zones for Location Privacy in Vehicular Networks. In: ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS). ACM, Vancouver (2007)
-
(2007)
ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS)
-
-
Freudiger, J.1
Raya, M.2
Félegyházi, M.3
Papadimitratos, P.4
Hubaux, J.P.5
-
16
-
-
57449105235
-
Secure vehicular communication systems: Design and architecture
-
Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.P.: Secure vehicular communication systems: design and architecture. IEEE Communications Magazine 46(11), 100-109 (2008)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.11
, pp. 100-109
-
-
Papadimitratos, P.1
Buttyan, L.2
Holczer, T.3
Schoch, E.4
Freudiger, J.5
Raya, M.6
Ma, Z.7
Kargl, F.8
Kung, A.9
Hubaux, J.P.10
-
17
-
-
37149046758
-
Securing Vehicular Communications - Assumptions, Requirements, and Principles
-
Papadimitratos, P., Gligor, V., Hubaux, J.P.: Securing Vehicular Communications - Assumptions, Requirements, and Principles. In:Workshop on Embedded Security in Cars (ESCAR), pp. 5-14 (2006)
-
(2006)
Workshop on Embedded Security in Cars (ESCAR)
, pp. 5-14
-
-
Papadimitratos, P.1
Gligor, V.2
Hubaux, J.P.3
-
18
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association, Berkeley
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, p. 21. USENIX Association, Berkeley (2004)
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
19
-
-
84869463849
-
Specification of the identity mixer cryptographic library
-
Security Team, IBM Research Zurich: IBM Research April
-
Security Team, IBM Research Zurich: Specification of the identity mixer cryptographic library. IBM Research Report 3730, IBM Research (April 2010)
-
(2010)
IBM Research Report 3730
-
-
-
20
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
21
-
-
24944435537
-
Compact E-Cash
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
22
-
-
84861423000
-
-
August
-
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 (August 2010), http://dud.inf.tu- dresden.de/literatur/Anon-Terminology-v0.34.pdf
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
, vol.34
-
-
Pfitzmann, A.1
Hansen, M.2
-
23
-
-
0001009871
-
An n5/2 algorithm for maximum matchings in bipartite graphs
-
Hopcroft, J.E., Karp, R.M.: An n5/2 algorithm for maximum matchings in bipartite graphs. SIAM Journal on Computing 2(4), 225-231 (1973)
-
(1973)
SIAM Journal on Computing
, vol.2
, Issue.4
, pp. 225-231
-
-
Hopcroft, J.E.1
Karp, R.M.2
|