-
1
-
-
84864607418
-
-
"Blackout 2003," http://www.ieso. ca/imoweb/EmergencyPrep/ blackout2003, 2012.
-
(2012)
Blackout 2003
-
-
-
2
-
-
79956357124
-
Challenges and opportunities in smart grid: A position article
-
June
-
G. W. Arnold, "Challenges and Opportunities in Smart Grid: A Position Article," Proc. IEEE, vol. 99, no. 6, pp. 922-927, June 2011.
-
(2011)
Proc. IEEE
, vol.99
, Issue.6
, pp. 922-927
-
-
Arnold, G.W.1
-
3
-
-
77956064262
-
Smart transmission grid: Vision and framework
-
Sept.
-
F. Li, W. Qiao, H. Sun, H. Wan, J. Wang, Y. Xia, Z. Xu, and P. Zhang, "Smart Transmission Grid: Vision and Framework," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 168-177, Sept. 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 168-177
-
-
Li, F.1
Qiao, W.2
Sun, H.3
Wan, H.4
Wang, J.5
Xia, Y.6
Xu, Z.7
Zhang, P.8
-
4
-
-
77955696530
-
A reliability perspective of the smart grid
-
June
-
K. Moslehi and R. Kumar, "A Reliability Perspective of the Smart Grid," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 57-64, June 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 57-64
-
-
Moslehi, K.1
Kumar, R.2
-
5
-
-
79953788803
-
Machine-To-machine communications for home energy management system in smart grid
-
Apr.
-
D. Niyato, L. Xiao, and P. Wang, "Machine-To-Machine Communications for Home Energy Management System in Smart Grid," IEEE Comm. Magazine, vol. 49, no. 4, pp. 53-59, Apr. 2011.
-
(2011)
IEEE Comm. Magazine
, vol.49
, Issue.4
, pp. 53-59
-
-
Niyato, D.1
Xiao, L.2
Wang, P.3
-
6
-
-
79953792812
-
Toward intelligent machine-To-machine communications in smart grid
-
Apr.
-
Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, "Toward Intelligent Machine-To-Machine Communications in Smart Grid," IEEE Comm. Magazine, vol. 49, no. 4, pp. 60-65, Apr. 2011.
-
(2011)
IEEE Comm. Magazine
, vol.49
, Issue.4
, pp. 60-65
-
-
Fadlullah, Z.M.1
Fouda, M.M.2
Kato, N.3
Takeuchi, A.4
Iwasaki, N.5
Nozaki, Y.6
-
7
-
-
84861608803
-
Towards optimal energy store-carry-And-deliver for phevs via v2g system
-
Mar.
-
H. Liang, B. Choi, W. Zhuang, and X. Shen, "Towards Optimal Energy Store-Carry-And-Deliver for Phevs Via v2g System," Proc. IEEE INFOCOM '12, pp. 25-30, Mar. 2012.
-
(2012)
Proc. IEEE INFOCOM '12
, pp. 25-30
-
-
Liang, H.1
Choi, B.2
Zhuang, W.3
Shen, X.4
-
8
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
May/June
-
P. McDaniel and S. McLaughlin, "Security and Privacy Challenges in the Smart Grid," IEEE Security & Privacy, vol. 7, no. 3, pp. 75-77, May/June 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
9
-
-
80053528646
-
An early warning system against malicious activities for smart grid communications
-
Sept./Oct.
-
Z. M. Fadlullah, M. M. Fouda, X. Shen, Y. Nozaki, and N. Kato, "An Early Warning System Against Malicious Activities for Smart Grid Communications," IEEE Network Magazine, vol. 25, no. 5, pp. 50-55, Sept./Oct. 2011.
-
(2011)
IEEE Network Magazine
, vol.25
, Issue.5
, pp. 50-55
-
-
Fadlullah, Z.M.1
Fouda, M.M.2
Shen, X.3
Nozaki, Y.4
Kato, N.5
-
10
-
-
82155185209
-
A light-weight message authentication scheme for smart grid communications
-
Dec.
-
M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. Shen, "A Light-Weight Message Authentication Scheme for Smart Grid Communications," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675-685, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 675-685
-
-
Fouda, M.M.1
Fadlullah, Z.M.2
Kato, N.3
Lu, R.4
Shen, X.5
-
11
-
-
79957710498
-
A dependency graph approach for fault detection and localization towards secure smart grid
-
June
-
M. He and J. Zhang, "A Dependency Graph Approach for Fault Detection and Localization towards Secure Smart Grid," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 342-351, June 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 342-351
-
-
He, M.1
Zhang, J.2
-
12
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
June
-
Y. Yuan, Z. Li, and K. Ren, "Modeling Load Redistribution Attacks in Power Systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, June 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
13
-
-
79953785474
-
Grs: The green, reliability, and security of emerging machine to machine communications
-
Apr.
-
R. Lu, X. Li, X. Lin, X. Liang, and X. Shen, "GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications," IEEE Comm. Magazine, vol. 49, no. 4, pp. 28-35, Apr. 2011.
-
(2011)
IEEE Comm. Magazine
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Lin, X.3
Liang, X.4
Shen, X.5
-
15
-
-
67651030465
-
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
-
article 20
-
C. Castelluccia, A. C.-F. Chan, E. Mykletun, and G. Tsudik, "Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks," Trans. Sensor Networks, vol. 5, no. 3, article 20, 2009.
-
(2009)
Trans. Sensor Networks
, vol.5
, Issue.3
-
-
Castelluccia, C.1
Chan, A.C.-F.2
Mykletun, E.3
Tsudik, G.4
-
16
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
-
DOI 10.1109/TMC.2006.144, 1683790
-
D. Westhoff, J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006. (Pubitemid 44335247)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
17
-
-
77953308558
-
Prisense: Privacy-preserving data aggregation in people-centric urban sensing systems
-
J. Shi, R. Zhang, Y. Liu, and Y. Zhang, "Prisense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems," Proc. IEEE INFOCOM, pp. 758-766, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 758-766
-
-
Shi, J.1
Zhang, R.2
Liu, Y.3
Zhang, Y.4
-
18
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. K. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001. (Pubitemid 33317917)
-
(2001)
Lecture notes in computer science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
70350675296
-
Privacy-preserving tuple matching in distributed databases
-
Dec.
-
Y. Sang, H. Shen, and H. Tian, "Privacy-Preserving Tuple Matching in Distributed Databases," IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12, pp. 1767-1782, Dec. 2009.
-
(2009)
IEEE Trans. Knowledge and Data Eng.
, vol.21
, Issue.12
, pp. 1767-1782
-
-
Sang, Y.1
Shen, H.2
Tian, H.3
-
20
-
-
33750333499
-
Privacy-preserving algorithms for distributed mining of frequent itemsets
-
DOI 10.1016/j.ins.2006.08.010, PII S0020025506002441
-
S. Zhong, "Privacy-Preserving Algorithms for Distributed Mining of Frequent Itemsets," Information Sciences, vol. 177, no. 2, pp. 490-503, 2007. (Pubitemid 44634455)
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 490-503
-
-
Zhong, S.1
-
21
-
-
23044435711
-
Short signatures from the weil pairing
-
DOI 10.1007/s00145-004-0314-9
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, 2004. (Pubitemid 41201461)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
22
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. ACM Conf. Computer and Comm. Security, pp. 62-73, 1993.
-
(1993)
Proc. ACM Conf. Computer and Comm. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
23
-
-
38149054118
-
-
B. Lynn, "PBC Library," http://crypto. stanford.edu/pbc/, 2012.
-
(2012)
PBC Library
-
-
Lynn, B.1
-
25
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
DOI 10.1109/MOBIQUITOUS.2005.25, 1540992, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient Aggregation of Encrypted Data in Wireless Sensor Networks," Proc. Second Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Systems (MobiQuitous), pp. 109-117, 2005. (Pubitemid 44523269)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
26
-
-
77952053188
-
Mdpa: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks
-
X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks," Wireless Comm. and Mobile Computing, vol. 10, no. 6, pp. 843-856, 2010.
-
(2010)
Wireless Comm. and Mobile Computing
, vol.10
, Issue.6
, pp. 843-856
-
-
Lin, X.1
Lu, R.2
Shen, X.3
|