-
2
-
-
82855175259
-
-
The National Energy Technology Laboratory (NETL), June 18
-
The National Energy Technology Laboratory (NETL), Understanding the Benefits of Smart Grid, June 18, 2010.
-
(2010)
Understanding the Benefits of Smart Grid
-
-
-
4
-
-
80052012333
-
Secure and Efficient Capability-based Power Management in the Smart Grid
-
Parallel and Distributed Processing with Applications Workshops, IEEE International Symposium on
-
Seo, D., Lee, H., and Perrig, A., Secure and Efficient Capability-based Power Management in the Smart Grid, Parallel and Distributed Processing with Applications Workshops, IEEE International Symposium on, pp. 119-126, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops, 2011
-
2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops, 2011
, pp. 119-126
-
-
Seo, D.1
Lee, H.2
Perrig, A.3
-
5
-
-
82155177539
-
Secure Lossless Aggregation for Smart Grid M2M Networks
-
Bartoli, A., Hernandez-Serrano, J.,Soriano, M., Dohler, M.,Kountouris, A.,Barthel, D.,Secure Lossless Aggregation for Smart Grid M2M Networks, First IEEE International Conference on Smart Grid Communications, 2010.
-
First IEEE International Conference on Smart Grid Communications, 2010
-
-
Bartoli, A.1
Hernandez-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
6
-
-
84874468531
-
Data aggregation techniques in sensor networks: A survey
-
Rajagopalan, R., Varshney, P.K., Data aggregation techniques in sensor networks: a survey, IEEE Communication Surveys Tutorials 8 (4), 2006.
-
(2006)
IEEE Communication Surveys Tutorials
, vol.8
, Issue.4
-
-
Rajagopalan, R.1
Varshney, P.K.2
-
7
-
-
39649120580
-
The Impact of Data Aggregation on the Performance of Wireless Sensor Networks
-
Akkaya, K., Demirbas, M. and Aygun R.S., The Impact of Data Aggregation on the Performance of Wireless Sensor Networks, Wiley Wireless Communications & Mobile Computing (WCMC) Journal, Vol. 8 pp. 171-193, 2008.
-
(2008)
Wiley Wireless Communications & Mobile Computing (WCMC) Journal
, vol.8
, pp. 171-193
-
-
Akkaya, K.1
Demirbas, M.2
Aygun, R.S.3
-
8
-
-
34248662954
-
In-network aggregation techniques for wireless sensor networks: A survey
-
Fasolo, E., Rossi, M., Widmer, J., and Zorzi, M., In-network aggregation techniques for wireless sensor networks: a survey, IEEE Wireless Communications, Vol 14 Issue 2, pp 70-87, 2007.
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.2
, pp. 70-87
-
-
Fasolo, E.1
Rossi, M.2
Widmer, J.3
Zorzi, M.4
-
9
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
S. Ozdemir, and Y. Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, in Computer Network Journal, 2009, Vol 53, pp. 2022-2037.
-
(2009)
Computer Network Journal
, vol.53
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
10
-
-
76949090588
-
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
-
Peter, S., Westhoff, D., and Castellucia, C., A Survey on the Encryption of Convergecast Traffic with In-Network Processing, IEEE Transactions on Dependable and Secure Computing, Vol. 7., No. 1, 2010.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.1
-
-
Peter, S.1
Westhoff, D.2
Castellucia, C.3
-
11
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Pascal Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT 1999, pp223-238.
-
EUROCRYPT 1999
, pp. 223-238
-
-
Paillier, P.1
-
13
-
-
24144459865
-
Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
Girao, J., Westhoff, D., and Schneider, M., Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks, IEEE International Conference on Communications, 2005.
-
IEEE International Conference on Communications, 2005
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
14
-
-
36348942851
-
On Concealed Data Aggregation for Wireless Sensor Networks
-
S. Peter, K. Piotrowski, and P. Langendoerfer,On Concealed Data Aggregation for Wireless Sensor Networks, Proc. IEEE Consumer Communications and Networking Conference, pp.192-196, 2007
-
(2007)
Proc. IEEE Consumer Communications and Networking Conference
, pp. 192-196
-
-
Peter, S.1
Piotrowski, K.2
Langendoerfer, P.3
-
15
-
-
0001412930
-
A new public-key cryptosystem as secure as factoring
-
Okamoto, T., and Uchimaya, S., A new public-key cryptosystem as secure as factoring, Advances in Cryptology - EUROCRYPT'98, pp. 208-218, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT'98
, pp. 208-218
-
-
Okamoto, T.1
Uchimaya, S.2
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest,R.L., Shamir,A. and Adleman, L. M.,A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
0000534667
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
G. R. Blakley and David Chaum, editors, CRYPTO 1984, Springer
-
Gamal, T.E., A public key cryptosystem and a signature scheme based on discrete logarithms. In G. R. Blakley and David Chaum, editors, CRYPTO 1984, volume 196 of Lecture Notes in Computer Science, pages 1018. Springer, 1984.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 1018
-
-
Gamal, T.E.1
-
20
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, E. Mykletun, and G. Tsudik, Efficient aggregation of encrypted data in wireless sensor networks, in Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous 2005. The Second Annual International Conference on, 2005, pp. 109 117
-
Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous 2005. The Second Annual International Conference on, 2005
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
21
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
Fontaine, C., and Galand, F., A survey of homomorphic encryption for nonspecialists. Eurasip Journal of Information Security, 2007(1):115, 2007.
-
(2007)
Eurasip Journal of Information Security
, vol.2007
, Issue.1
, pp. 115
-
-
Fontaine, C.1
Galand, F.2
|