-
1
-
-
34547667478
-
A novel method to construct taxonomy electrical appliances based on load signature
-
H. Y. Lam, G. S. K. Fung, and W. K. Lee, "A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signature,", In IEEE Transactions on Consumer Electronics, Vol. 53, no. 2, pp. 653-660, 2007.
-
(2007)
IEEE Transactions on Consumer Electronics
, vol.53
, Issue.2
, pp. 653-660
-
-
Lam, H.Y.1
Fung, G.S.K.2
Lee, W.K.3
-
2
-
-
78650887542
-
Private memoirs of a smart meter
-
Zurich, Switzerland, November
-
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, "Private Memoirs of a Smart Meter,", In the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings (BuildSys 2010), Zurich, Switzerland, November 2010.
-
(2010)
The 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings (BuildSys 2010)
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
4
-
-
79954605963
-
Guidelines for smart grid cyber security
-
NIST NISTIR 7628, August
-
NIST, "Guidelines for Smart Grid Cyber Security, Vol. 2, Privacy and the Smart Grid", NISTIR 7628, August 2010.
-
(2010)
Privacy and the Smart Grid
, vol.2
-
-
-
8
-
-
84855849799
-
Smart meter privacy: A utility-privacy framework
-
S. Raj Rajagopalan, L. Sankar, S. Mohajer, H. Vincent Poor, "Smart Meter Privacy: A Utility-Privacy Framework,", In Proceedings of IEEE SmartGridComm, 2011.
-
(2011)
Proceedings of IEEE SmartGridComm
-
-
Raj Rajagopalan, S.1
Sankar, L.2
Mohajer, S.3
Vincent Poor, H.4
-
9
-
-
85084161366
-
TOR: The second-generation onion router
-
R. Dingledine, N. Mathewson and P. Syverson, "TOR: The Second-Generation Onion Router,", In Proceedings of the 13th Conference on USENIX Security Symposium (USENIX Security), pp. 21-38, 2004.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium (USENIX Security)
, pp. 21-38
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
10
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
Fuzziness, and Knowledge-Based Systems
-
L. Sweeney, "K-anonymity: a Model for Protecting Privacy,", In International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems 10, 557-570, 2002.
-
(2002)
International Journal of Uncertainty
, vol.10
, pp. 557-570
-
-
Sweeney, L.1
-
11
-
-
85024290278
-
Group signatures
-
of Lecture Notes in Computer Science
-
D. Chaum and E. van Heyst, "Group Signatures,", Advances in Cryptology-EUROCRYPT 1991, Volume 547 of Lecture Notes in Computer Science. pp. 257-265, 1991.
-
(1991)
Advances in Cryptology-EUROCRYPT 1991
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret,", In Communications of the ACM 22 (11): 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0001604533
-
Blind signatures for untraceable payments
-
D. Chaum, "Blind Signatures for Untraceable Payments,", In CRYPTO, 1982.
-
(1982)
CRYPTO
-
-
Chaum, D.1
-
17
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr, "Efficient Signature Generation by Smart Cards,", In Journal of Cryptology 4(3), 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
-
-
Schnorr, C.P.1
-
18
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
G. Kalogridis, C. Efthymiou, S.Z. Denic, T.A. Lewis, and R. Cepeda, "Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures,", In Proceedings of IEEE SmartGridComm 2010.
-
(2010)
Proceedings of IEEE SmartGridComm
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.Z.3
Lewis, T.A.4
Cepeda, R.5
-
20
-
-
80051653423
-
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
-
D. P. Varodayan, A. Khisti, "Smart Meter Privacy Using a Rechargeable Battery: Minimizing the Rate of Information Leakage,", In ICASSP 2011.
-
(2011)
ICASSP
-
-
Varodayan, D.P.1
Khisti, A.2
-
21
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin, "Security and Privacy Challenges in the Smart Grid,", In IEEE Security and Privacy, Vol. 7, No. 3., 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.3
-
-
McDaniel, P.1
McLaughlin, S.2
-
22
-
-
77953066525
-
Choosing reputable servents in a P2P network
-
F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, "Choosing Reputable Servents in a P2P Network,", In 11th International World Wide Web Conference, 2002.
-
(2002)
11th International World Wide Web Conference
-
-
Cornelli, F.1
Damiani, E.2
Di Vimercati, S.D.C.3
Paraboschi, S.4
Samarati, P.5
-
23
-
-
36849011541
-
SuperTrust - A secure and efficient framework for handling trust in super peer networks
-
T. Dimitriou, G. Karame, and I. Christou, "SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks,", In Proceedings of PODC, 2007.
-
(2007)
Proceedings of PODC
-
-
Dimitriou, T.1
Karame, G.2
Christou, I.3
-
25
-
-
84877949131
-
-
Contracts - Bitcoin, Available from https://en.bitcoin.it/wiki/Contracts
-
-
-
|