메뉴 건너뛰기




Volumn 7163 LNCS, Issue , 2012, Pages 75-90

Design and evaluation of a privacy-preserving architecture for vehicle-to-grid interaction

Author keywords

privacy enhancing technologies; privacy preserving architecture; quantification of privacy; vehicle to grid interaction

Indexed keywords

CHARGING PROCESS; CONTROL VEHICLES; DRIVING PATTERN; GRID RESOURCE; POWER GRIDS; PRIVACY PRESERVING; PRIVACY-ENHANCING TECHNOLOGIES; SENSITIVE INFORMATIONS; VEHICLE TO GRIDS;

EID: 84861424823     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29804-2_5     Document Type: Conference Paper
Times cited : (16)

References (23)
  • 2
    • 70449409371 scopus 로고    scopus 로고
    • A conceptual framework for the vehicle-to-grid (V2G) implementation
    • Guille, C., Gross, G.: A conceptual framework for the vehicle-to-grid (V2G) implementation. Energy Policy 37(11), 4379-4390 (2009)
    • (2009) Energy Policy , vol.37 , Issue.11 , pp. 4379-4390
    • Guille, C.1    Gross, G.2
  • 3
    • 34247587103 scopus 로고    scopus 로고
    • Using fleets of electric-drive vehicles for grid support
    • Tomic, J., Kempton, W.: Using fleets of electric-drive vehicles for grid support. Journal of Power Sources 168(2), 459-468 (2007)
    • (2007) Journal of Power Sources , vol.168 , Issue.2 , pp. 459-468
    • Tomic, J.1    Kempton, W.2
  • 5
    • 77955132877 scopus 로고    scopus 로고
    • Secure wireless communication platform for EV-to-Grid research
    • Helmy, A., Mueller, P., Zhang, Y. (eds.) ACM
    • Guo, H., Yu, F., Wong, W.-C., Suhendra, V., Wu, Y.D.: Secure wireless communication platform for EV-to-Grid research. In: Helmy, A., Mueller, P., Zhang, Y. (eds.) IWCMC, pp. 21-25. ACM (2010)
    • (2010) IWCMC , pp. 21-25
    • Guo, H.1    Yu, F.2    Wong, W.-C.3    Suhendra, V.4    Wu, Y.D.5
  • 7
    • 84855834796 scopus 로고    scopus 로고
    • Privacy and the Smart Grid
    • Smart Grid Interoperability Panel - Cyber Security Working Group: Technical Report NISTIR 7628, National Institute of Standards and Technology August
    • Smart Grid Interoperability Panel - Cyber Security Working Group: Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid. Technical Report NISTIR 7628, National Institute of Standards and Technology (August 2010)
    • (2010) Guidelines for Smart Grid Cyber Security , vol.2
  • 8
    • 79954610963 scopus 로고    scopus 로고
    • SmartPrivacy for the Smart Grid: Embedding privacy into the design of electricity conservation
    • 10.1007/s12394-010-0046-y
    • Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3, 275-294 (2010), 10.1007/s12394-010-0046-y
    • (2010) Identity in the Information Society , vol.3 , pp. 275-294
    • Cavoukian, A.1    Polonetsky, J.2    Wolf, C.3
  • 9
    • 18844440199 scopus 로고    scopus 로고
    • Vehicle-to-grid power implementation: From stabilizing the grid to supporting large-scale renewable energy
    • Kempton, W., Tomic, J.: Vehicle-to-grid power implementation: From stabilizing the grid to supporting large-scale renewable energy. Journal of Power Sources 144(1), 280-294 (2005)
    • (2005) Journal of Power Sources , vol.144 , Issue.1 , pp. 280-294
    • Kempton, W.1    Tomic, J.2
  • 11
    • 67650312114 scopus 로고    scopus 로고
    • On the Anonymity of Home/Work Location Pairs
    • Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. Springer, Heidelberg
    • Golle, P., Partridge, K.: On the Anonymity of Home/Work Location Pairs. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390-397. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5538 , pp. 390-397
    • Golle, P.1    Partridge, K.2
  • 12
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Security and Privacy 7, 75-77 (2009)
    • (2009) IEEE Security and Privacy , vol.7 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 19
    • 84869463849 scopus 로고    scopus 로고
    • Specification of the identity mixer cryptographic library
    • Security Team, IBM Research Zurich: IBM Research April
    • Security Team, IBM Research Zurich: Specification of the identity mixer cryptographic library. IBM Research Report 3730, IBM Research (April 2010)
    • (2010) IBM Research Report 3730
  • 20
    • 84945135810 scopus 로고    scopus 로고
    • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 21
    • 24944435537 scopus 로고    scopus 로고
    • Compact E-Cash
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact E-Cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302-321. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 23
    • 0001009871 scopus 로고
    • An n5/2 algorithm for maximum matchings in bipartite graphs
    • Hopcroft, J.E., Karp, R.M.: An n5/2 algorithm for maximum matchings in bipartite graphs. SIAM Journal on Computing 2(4), 225-231 (1973)
    • (1973) SIAM Journal on Computing , vol.2 , Issue.4 , pp. 225-231
    • Hopcroft, J.E.1    Karp, R.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.