메뉴 건너뛰기




Volumn , Issue , 2012, Pages 294-299

P3: Privacy preservation protocol for appliance control application

Author keywords

Data Privacy; Privacy Preservation; Smart Grid

Indexed keywords

APPLIANCE CONTROL SYSTEMS; APPLIANCE CONTROLS; DESIGN AND IMPLEMENTS; PERSONAL INFORMATION; PRIVACY PRESERVATION; SENSITIVE INFORMATIONS; SMART GRID; UTILITY COMPANIES;

EID: 84876028271     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SmartGridComm.2012.6485999     Document Type: Conference Paper
Times cited : (7)

References (34)
  • 1
    • 84876041891 scopus 로고    scopus 로고
    • website: gmplib. org
    • website: gmplib. org
  • 2
    • 84876033397 scopus 로고    scopus 로고
    • website: cybernetnews. com/control-lights-with-your-iphone/
    • website: cybernetnews. com/control-lights-with-your-iphone/
  • 3
    • 84876062462 scopus 로고    scopus 로고
    • website: chigogroup. com/en/newsinfo. aspx?id=304&idd=0401
    • website: chigogroup. com/en/newsinfo. aspx?id=304&idd=0401
  • 5
    • 23044435243 scopus 로고    scopus 로고
    • Efficient implementations for Pairing-based Cryptography
    • P. Barreto, B. Lynn, and M. Scott, Efficient implementations for Pairing-based Cryptography. Journal of Cryptology, 17, pp. 321-334, 2004.
    • (2004) Journal of Cryptology , vol.17 , pp. 321-334
    • Barreto, P.1    Lynn, B.2    Scott, M.3
  • 7
    • 23044435711 scopus 로고    scopus 로고
    • Short Signatures from the Weil pairing
    • D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil pairing, Journal of Cryptology, 17, pp. 297-319, 2004.
    • (2004) Journal of Cryptology , vol.17 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from Weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from Weil pairing. In Proc. of Crypto 2001, LNCS vol. 2139, pp. 213-229, 2001.
    • (2001) Proc. of Crypto 2001, LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 9
    • 78149274300 scopus 로고    scopus 로고
    • AERO: Extraction of user's activities from electric power consumption data
    • H. S. Cho, T. Yamazaki, and M. Hahn. AERO: Extraction of user's activities from electric power consumption data. IEEE Transactions on Consumer Electronics, 56, pp. 2011-2018, 2010.
    • (2010) IEEE Transactions on Consumer Electronics , vol.56 , pp. 2011-2018
    • Cho, H.S.1    Yamazaki, T.2    Hahn, M.3
  • 10
    • 80051646795 scopus 로고    scopus 로고
    • Smart Grid Privacy via anonymization of smart metering data
    • C. Efthymiou and G. Kalogridis. Smart Grid Privacy via anonymization of smart metering data. In IEEE (SmartGridComm'10), pp. 238-243, 2010.
    • (2010) IEEE (SmartGridComm'10) , pp. 238-243
    • Efthymiou, C.1    Kalogridis, G.2
  • 11
    • 80054080910 scopus 로고    scopus 로고
    • Privacy-friendly energy-metering via homomorphic encryption
    • F. D. Garcia and B. Jacobs. Privacy-friendly energy-metering via homomorphic encryption. Security and Trust Management, LNCS vol. 6710, pp. 226-238, 2011.
    • (2011) Security and Trust Management, LNCS , vol.6710 , pp. 226-238
    • Garcia, F.D.1    Jacobs, B.2
  • 12
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In 13th ACM CCS'06.
    • 13th ACM CCS'06
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 16
    • 56749137665 scopus 로고    scopus 로고
    • A hybrid group key management protocol for reliable and authenticated rekeying
    • D. Li and S. Sampalli, "A hybrid group key management protocol for reliable and authenticated rekeying, " International Journal of Network Security, vol. 6, no. 3, pp. 270-281, 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.3 , pp. 270-281
    • Li, D.1    Sampalli, S.2
  • 18
    • 80051631772 scopus 로고    scopus 로고
    • Secure information aggregation for smart grids using homomorphic encryption
    • F. Li, B. Luo, and P. Liu. Secure information aggregation for smart grids using homomorphic encryption. In SmartGridComm'10, pp. 327-332.
    • SmartGridComm'10 , pp. 327-332
    • Li, F.1    Luo, B.2    Liu, P.3
  • 19
    • 79955950768 scopus 로고    scopus 로고
    • Compressed meter reading for delay-sensitive and secure load report in smart grid
    • H. Li, R. Mao, L. Lai, and R. C. Qiu. Compressed meter reading for delay-sensitive and secure load report in smart grid. In SmartGridComm'10, pp. 114-119.
    • SmartGridComm'10 , pp. 114-119
    • Li, H.1    Mao, R.2    Lai, L.3    Qiu, R.C.4
  • 20
    • 82155192847 scopus 로고    scopus 로고
    • Multicast authentication in the smart grid with one-time signature
    • Q. Li and G. Cao. Multicast Authentication in the Smart Grid with One-Time Signature. IEEE Transactions on Smart Grid, 2, pp. 686-696, 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , pp. 686-696
    • Li, Q.1    Cao, G.2
  • 21
    • 79959950900 scopus 로고    scopus 로고
    • Privacy concerns in upcoming residential and commercial demand-response systems
    • March
    • M. A. Lisovich and S. B. Wicker. Privacy concerns in upcoming residential and commercial demand-response systems. IEEE Proceedings on Power Systems, 1, pp. 1-8, March 2008.
    • (2008) IEEE Proceedings on Power Systems , vol.1 , pp. 1-8
    • Lisovich, M.A.1    Wicker, S.B.2
  • 22
    • 77249154055 scopus 로고    scopus 로고
    • Inferring personal information from demand-response systems
    • Jan.-Feb.
    • M. A. Lisovich, D. K. Mulligan, S. B. Wicker. Inferring personal information from demand-response systems, In IEEE Security & Privacy, vol 8(1), pp. 11-20, Jan.-Feb. 2010
    • (2010) IEEE Security & Privacy , vol.8 , Issue.1 , pp. 11-20
    • Lisovich, M.A.1    Mulligan, D.K.2    Wicker, S.B.3
  • 26
    • 77952887452 scopus 로고    scopus 로고
    • Security Technology for smart grid networks
    • A. R. Metke and R. L. Ekl. Security Technology for smart grid networks. IEEE Transactions on Smart Grid, 1, pp. 99-107, 2010.
    • (2010) IEEE Transactions on Smart Grid , vol.1 , pp. 99-107
    • Metke, A.R.1    Ekl, R.L.2
  • 27
    • 84876048919 scopus 로고    scopus 로고
    • NIST, Guidelines for Smart Grid Cyber Security: 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, NISTIR 7628. August 2010
    • NIST, Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, NISTIR 7628. August, 2010.
  • 28
    • 84876058060 scopus 로고    scopus 로고
    • NIST, Guidelines for Smart Grid Cyber Security: 2, Privacy and the Smart Grid, NISTIR 7628. August 2010
    • NIST, Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid, NISTIR 7628. August, 2010.
  • 29
    • 79954594251 scopus 로고    scopus 로고
    • Privacy and the new energy infrastructure
    • Feb. 2009. website: papers. ssrn. com/sol3/papers. cfm?abstract-id= 1370731
    • E. L. Quinn. Privacy and the new energy infrastructure. Social Science Research Network (SSRN). Feb. 2009. website: papers. ssrn. com/sol3/papers. cfm?abstract-id=1370731
    • Social Science Research Network (SSRN)
    • Quinn, E.L.1
  • 32
    • 84855833423 scopus 로고    scopus 로고
    • Competitive privacy in the smart grid: An information-theoretic approach
    • L. Sankar, S. Kar, R. Tandon, and H. V. Poor. Competitive privacy in the smart grid: An information-theoretic approach. In SmartGridComm'11.
    • SmartGridComm'11
    • Sankar, L.1    Kar, S.2    Tandon, R.3    Poor, H.V.4
  • 33
    • 70349653420 scopus 로고    scopus 로고
    • Time valid one-time signature for time-critical multicast data authentication
    • Q. Wang, H. Khurana, Y. Huang; K. Nahrstedt, Time Valid One-Time Signature for Time-Critical Multicast Data Authentication, IEEE INFOCOM 2009, pp. 1233- 1241
    • (2009) IEEE INFOCOM , pp. 1233-1241
    • Wang, Q.1    Khurana, H.2    Huang, Y.3    Nahrstedt, K.4
  • 34
    • 82155198906 scopus 로고    scopus 로고
    • Application-aware secure multicast for power grid communication
    • J. Zhang and C. A. Gunter. Application-aware secure multicast for power grid communication. In IEEE SmartGridComm'10, pp. 339-344, 2010.
    • (2010) IEEE SmartGridComm'10 , pp. 339-344
    • Zhang, J.1    Gunter, C.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.