-
1
-
-
0038039365
-
Dynamic energy-consumption indicators for domestic appliances: Environment, behaviour and design
-
doi:10.1016/S0378-7788(02)00241-4
-
Wood, G., Newborough, M.: Dynamic energy-consumption indicators for domestic appliances: Environment, behaviour and design. Energy Build. 35(8), 821-841 (2003). doi: 10. 1016/S0378-7788(02)00241-4.
-
(2003)
Energy Build.
, vol.35
, Issue.8
, pp. 821-841
-
-
Wood, G.1
Newborough, M.2
-
2
-
-
84859771512
-
An adaptive scenario-based reasoning system across smart houses
-
doi:10.1007/s11277-010-0199-x
-
Cheng, S.-T., Wang, C.-H.: An adaptive scenario-based reasoning system across smart houses. Wirel. Pers. Commun. 64(2), 287-304 (2012). doi: 10. 1007/s11277-010-0199-x.
-
(2012)
Wirel. Pers. Commun.
, vol.64
, Issue.2
, pp. 287-304
-
-
Cheng, S.-T.1
Wang, C.-H.2
-
4
-
-
0038039365
-
Dynamic energy-consumption indicators for domestic appliances: Environment, behaviour and design
-
Wood, G., Newborough, M.: Dynamic energy-consumption indicators for domestic appliances: Environment, behaviour and design. Elsevier Energy Build. 35(8), 821-841 (2003).
-
(2003)
Elsevier Energy Build.
, vol.35
, Issue.8
, pp. 821-841
-
-
Wood, G.1
Newborough, M.2
-
5
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
McDaniel, P., McLaughlin, S.: Security and privacy challenges in the smart grid. IEEE Secur. Priv. 7, 75-77 (2009).
-
(2009)
IEEE Secur. Priv.
, vol.7
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
6
-
-
79954610963
-
SmartPrivacy for the smart grid: Embedding privacy into the design of electricity conservation
-
Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the smart grid: Embedding privacy into the design of electricity conservation. Identity Inf. Soc. 3(2), 275-294 (2010).
-
(2010)
Identity Inf. Soc.
, vol.3
, Issue.2
, pp. 275-294
-
-
Cavoukian, A.1
Polonetsky, J.2
Wolf, C.3
-
7
-
-
0005301490
-
-
Academic Press, Ch. On data banks and privacy homomorphisms
-
Rivest, R., Adleman, L., Dertouzos, M.: Foundations of Secure Computation. Academic Press, pp. 169-177. Ch. On data banks and privacy homomorphisms (1978).
-
(1978)
Foundations of Secure Computation
, pp. 169-177
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
8
-
-
39049129632
-
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
-
Armknecht, F., Westhoff, D., Girao, J., Hessler, A.: A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. Comput. Commun. 31(4), 734-749 (2008).
-
(2008)
Comput. Commun.
, vol.31
, Issue.4
, pp. 734-749
-
-
Armknecht, F.1
Westhoff, D.2
Girao, J.3
Hessler, A.4
-
9
-
-
42549159545
-
Public key based cryptoschemes for data concealment in wireless sensor networks
-
Istanbul, Turkey
-
Mykletun, E., Girao, J., Westhoff, D.: Public key based cryptoschemes for data concealment in wireless sensor networks. In: IEEE International Conference on Communications, ICC2006. Istanbul, Turkey (2006).
-
(2006)
In: IEEE International Conference on Communications, ICC2006
-
-
Mykletun, E.1
Girao, J.2
Westhoff, D.3
-
11
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of EUROCRYPT'99, pp. 223-238 (1999).
-
(1999)
In: Proceedings of EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
12
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
IEEE Communications Society, Gaithersburg, USA
-
Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: First IEEE International Conference on Smart Grid Communications. IEEE Communications Society, Gaithersburg, USA, pp. 327-332 (2010).
-
(2010)
In: First IEEE International Conference on Smart Grid Communications
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
14
-
-
79961186207
-
A privacy-preserving concept for smart grids
-
DFN Workshop. Books on Demand GmbH
-
Petrlic, R.: A privacy-preserving concept for smart grids. In: Sicherheit in vernetzten Systemen: 18. DFN Workshop. Books on Demand GmbH, pp. B1-B14 (2010).
-
(2010)
In: Sicherheit in vernetzten Systemen: 18
-
-
Petrlic, R.1
-
15
-
-
78751648737
-
Identity-based cryptography for grid security
-
Lim, H. W., Paterson, K. G.: Identity-based cryptography for grid security. Int. J. Inf. Secur. 10(1), 15-32 (2011).
-
(2011)
Int. J. Inf. Secur.
, vol.10
, Issue.1
, pp. 15-32
-
-
Lim, H.W.1
Paterson, K.G.2
-
17
-
-
80755168372
-
Protecting consumer privacy from electric load monitoring
-
ACM, New York, NY, USA
-
McLaughlin, S., McDaniel, P., Aiello, W.: Protecting consumer privacy from electric load monitoring. In: Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, New York, NY, USA, pp. 87-98 (2011).
-
(2011)
In: Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 87-98
-
-
McLaughlin, S.1
McDaniel, P.2
Aiello, W.3
-
18
-
-
80955143493
-
Privacy-preserving smart metering
-
ACM, New York, NY, USA
-
Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES '11. ACM, New York, NY, USA, pp. 49-60 (2011).
-
(2011)
In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES '11
, pp. 49-60
-
-
Rial, A.1
Danezis, G.2
-
19
-
-
84860860164
-
Do not snoop my habits. Preserving privacy in the smart grid
-
Gómez Mármol, F., Sorge, C., Ugus, O., Martínez Pérez, G.: Do not snoop my habits. Preserving privacy in the smart grid. IEEE Commun. Mag. 50(5), 166-172 (2012).
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.5
, pp. 166-172
-
-
Gómez Mármol, F.1
Sorge, C.2
Ugus, O.3
Martínez Pérez, G.4
-
20
-
-
70349244709
-
Secure aggregation in a publish-subscribe system
-
Minami, K., Lee, A. J., Winslett, M., Borisov, N.: Secure aggregation in a publish-subscribe system. In: WPES '08: Proceedings of the 7th ACM Workshop on Privacy in the Electronic, Society, pp. 95-104 (2008).
-
(2008)
In: WPES '08: Proceedings of the 7th ACM Workshop on Privacy in the Electronic, Society
, pp. 95-104
-
-
Minami, K.1
Lee, A.J.2
Winslett, M.3
Borisov, N.4
-
21
-
-
33847753565
-
-
Protocol Version 1. 2. RFC 5246 (Proposed Standard) (Aug. 2008)
-
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1. 2. RFC 5246 (Proposed Standard) (Aug. 2008). http://www. ietf. org/rfc/rfc5246. txt.
-
The Transport Layer Security (TLS)
-
-
Dierks, T.1
Rescorla, E.2
-
23
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology, pp. 255-270 (2000).
-
(2000)
In: Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
24
-
-
27644530407
-
A framework for the revocation of unintended digital signatures initiated by malicious terminals
-
Zsolt Berta, I., Buttyan, L., Vajda, I.: A framework for the revocation of unintended digital signatures initiated by malicious terminals. IEEE Trans. Dependable Secur. Comput. 2, 268-272 (2005).
-
(2005)
IEEE Trans. Dependable Secur. Comput.
, vol.2
, pp. 268-272
-
-
Zsolt Berta, I.1
Buttyan, L.2
Vajda, I.3
-
25
-
-
36349002968
-
Support of anonymity in vanets-putting pseudonymity into practice
-
doi: 10. 1109/WCNC. 2007. 625, WCNC 2007. IEEE
-
Fonseca, E., Festag, A., Baldessari, R., Aguiar, R. L.: Support of anonymity in vanets-putting pseudonymity into practice. In: Wireless Communications and Networking Conference 2007. WCNC 2007. IEEE. pp. 3400-3405 (2007) doi: 10. 1109/WCNC. 2007. 625.
-
(2007)
In: Wireless Communications and Networking Conference 2007
, pp. 3400-3405
-
-
Fonseca, E.1
Festag, A.2
Baldessari, R.3
Aguiar, R.L.4
-
26
-
-
85084161366
-
Tor: the second-generation onion router
-
SSYM'04
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13, SSYM'04. pp. 21-21 (2004).
-
(2004)
In: Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
27
-
-
76949090588
-
A survey on the encryption of convergecast-traffic with in-network processing
-
doi:10.1109/TDSC.2008.23
-
Peter, S., Westhoff, D., Castelluccia, C.: A survey on the encryption of convergecast-traffic with in-network processing. IEEE Trans. Dependable Secur. Comput. 4, 20-34 (2010). doi: 10. 1109/TDSC. 2008. 23.
-
(2010)
IEEE Trans. Dependable Secur. Comput.
, vol.4
, pp. 20-34
-
-
Peter, S.1
Westhoff, D.2
Castelluccia, C.3
-
28
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109-117 (2005).
-
(2005)
In: The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
29
-
-
49649088025
-
Non-manipulable aggregator node election protocols for wireless sensor networks
-
Ad Hoc, and Wireless Networks (WiOpt)
-
Sirivianos, M., Westhoff, D., Armknecht, F., Girao, J.: Non-manipulable aggregator node election protocols for wireless sensor networks. In: Proceedings of the International Symposium on Modeling and Optimization in Mobile. Ad Hoc, and Wireless Networks (WiOpt) (2007).
-
(2007)
In: Proceedings of the International Symposium on Modeling and Optimization in Mobile
-
-
Sirivianos, M.1
Westhoff, D.2
Armknecht, F.3
Girao, J.4
-
30
-
-
76049114679
-
Private location-based information retrieval through user collaboration
-
doi: 10. 1016/j. comcom. 2009. 11. 024
-
Rebollo-Monedero, D., Forné, J., Solanas, A., Martínez-Ballesté, A.: Private location-based information retrieval through user collaboration. Comput. Commun. 33(6), 762-774 (2010). doi: 10. 1016/j. comcom. 2009. 11. 024.
-
(2010)
Comput. Commun.
, vol.33
, Issue.6
, pp. 762-774
-
-
Rebollo-Monedero, D.1
Forné, J.2
Solanas, A.3
Martínez-Ballesté, A.4
|