-
3
-
-
0026970695
-
Nonintrusive appliance load monitoring
-
December
-
G. Hart, "Nonintrusive Appliance Load Monitoring," Proceedings of the IEEE, Vol. 80, No. 12, December 1992.
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.12
-
-
Hart, G.1
-
4
-
-
84874636804
-
-
Technology Review Magazine June 28
-
L. Alan, The Measure of Power: Non-Intrusive Load Monitoring Gives Detailed Views of Where Power is Going, With Payoffs for Utilities, Consumers, and maybe Big Brother. Technology Review Magazine, June 28, 2001.
-
(2001)
The Measure of Power: Non-Intrusive Load Monitoring Gives Detailed Views of Where Power Is Going, with Payoffs for Utilities, Consumers, and Maybe Big Brother
-
-
Alan, L.1
-
5
-
-
79959950900
-
Privacy concerns in upcoming residential and commercial demand-response systems
-
March
-
M. Lisovich, and S. Wicker, "Privacy Concerns in Upcoming Residential and Commercial Demand-Response Systems," IEEE Proceedings On Power Systems, March 2008, Vol. 1, No. 1.
-
(2008)
IEEE Proceedings on Power Systems
, vol.1
, Issue.1
-
-
Lisovich, M.1
Wicker, S.2
-
6
-
-
0242369050
-
Power signature analysis
-
March/April
-
C. Laughman, K. Lee, R. Cox, S. Shaw, S. Leeb, L. Norford, and P. Armstrong, Power Signature Analysis. IEEE Power & Energy Magazine, March/April 2003.
-
(2003)
IEEE Power & Energy Magazine
-
-
Laughman, C.1
Lee, K.2
Cox, R.3
Shaw, S.4
Leeb, S.5
Norford, L.6
Armstrong, P.7
-
8
-
-
77954928042
-
Smart meters could be 'spy in the home'
-
October 11
-
A. Jamieson, Smart meters could be 'spy in the home'. Tony Gallagher: The Telegraph, October 11, 2009.
-
(2009)
Tony Gallagher: The Telegraph
-
-
Jamieson, A.1
-
10
-
-
84874583322
-
Utilities' smart meters save money but erode privacy
-
September 6
-
A. Maykuth, Utilities' smart meters save money, but erode privacy. The Philadelphia Inquirer, September 6, 2009.
-
(2009)
The Philadelphia Inquirer
-
-
Maykuth, A.1
-
14
-
-
84874638429
-
Smart hacking for privacy
-
Germany
-
S. Brinkhaus, D. Carluccio, U. Greveler, B. Justus, D. Löhr, C. Wegener. "Smart Hacking for Privacy." In Chaos Communication Congress 28C3. Germany, 2011.
-
(2011)
Chaos Communication Congress
, vol.28 C3
-
-
Brinkhaus, S.1
Carluccio, D.2
Greveler, U.3
Justus, B.4
Löhr, D.5
Wegener, C.6
-
15
-
-
80755169467
-
-
ACM
-
M. Enev, S. Gupta, T. Kohno, and S.N. Patel. "Televisions, Video Privacy, and Powerline Electromagnetic Interference." 537-550: ACM, 2011.
-
(2011)
Televisions, Video Privacy, and Powerline Electromagnetic Interference
, pp. 537-550
-
-
Enev, M.1
Gupta, S.2
Kohno, T.3
Patel, S.N.4
-
17
-
-
84862068311
-
Privacy-friendly aggregation for the smart-grid
-
Paper presented, PETS, Waterloo, Ontario, Canada
-
K. Kursawe, G. Danezis, & M. Kohlweiss, "Privacy-friendly Aggregation for the Smart-grid," Paper presented at the Privacy Enhancing Technologies: 11th International Symposium, PETS 2011, Waterloo, Ontario, Canada.
-
(2011)
Privacy Enhancing Technologies: 11th International Symposium
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
21
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
F. Garcia,, & B. Jacobs Privacy-friendly energy-metering via homomorphic encryption. Security and Trust Management, 226-238. (2011).
-
(2011)
Security and Trust Management
, pp. 226-238
-
-
Garcia, F.1
Jacobs, B.2
-
22
-
-
84865833574
-
Privacy-preserving stream aggregation with fault tolerance
-
T-H. Chan, E. Shi, E. Rieffel, & D.Song, Privacy-Preserving Stream Aggregation with Fault Tolerance. IACR Cryptology ePrint Archive 2011: 655(2011).
-
(2011)
IACR Cryptology EPrint Archive
, vol.2011
, pp. 655
-
-
Chan, T.-H.1
Shi, E.2
Rieffel, E.3
Song, D.4
-
23
-
-
84874637852
-
How to have the cake and eat it, too: Protecting privacy and energy efficiency in the smart grid
-
Paper presented, Prague, Czech Republic
-
K. Kursawe, How to have the cake and eat it, too: Protecting Privacy and Energy Efficiency in the Smart Grid. Paper presented at the Information Security Solutions Europe (ISSE), Prague, Czech Republic, 2011.
-
(2011)
Information Security Solutions Europe (ISSE)
-
-
Kursawe, K.1
-
24
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Cham, The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Crytology, vol. 1. P.65-75, 1988.
-
(1988)
Journal of Crytology
, vol.1
, pp. 65-75
-
-
Cham, D.1
-
25
-
-
80053014815
-
Differentially private billing with rebates
-
LNCS 6958
-
G. Danzis, M. Kohlweiss, and A, Rial, Differentially Private Billing with Rebates. Information Hiding, IH2011, LNCS 6958: pages 148- 162.
-
(2011)
Information Hiding IH
, pp. 148-162
-
-
Danzis, G.1
Kohlweiss, M.2
Rial, A.3
|