-
1
-
-
80052508859
-
A survey on the communication architectures in smart grid
-
W. Wang, Y. Xu, and M. Khanna, "A survey on the communication architectures in smart grid," Computer Networks, vol. 55, no. 15, 2011.
-
(2011)
Computer Networks
, vol.55
, Issue.15
-
-
Wang, W.1
Xu, Y.2
Khanna, M.3
-
2
-
-
84880221609
-
Internet protocol architecture for the smart grid
-
CISCOIPINTEROP STDS PPR TO NIST WP.pdf Jul
-
Cisco Systems, Inc., "Internet protocol architecture for the smart grid," White Paper, Jul. 2009. [Online]. Available: http://www.cisco.com/ web/strategy/docs/energy/CISCO IP INTEROP STDS PPR TO NIST WP.pdf
-
(2009)
White Paper
-
-
Systems Inc, C.1
-
3
-
-
84880247153
-
-
White Paper Jul
-
U.S. Department of Energy, "Smart grid system report," White Paper, Jul. 2009, available online at http://www.oe.energy.gov/SGSRmain 090707 lowres.pdf.
-
(2009)
Department of Energy Smart Grid System Report
-
-
-
4
-
-
84880217044
-
-
Smart grid security Deliverable, Jul
-
European Network and Information Security Agency, "Smart grid security," Deliverable, Jul. 2012. [Online]. Available: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/ critical- infrastructure-and-services/smart-grids-and-smart-metering/ ENISA-smart-grid- security-recommendations
-
(2012)
European Network, Information Security Agency
-
-
-
5
-
-
0026970695
-
Nonintrusive appliance load monitoring
-
DOI 10.1109/5.192069
-
G. Hart, "Nonintrusive appliance load monitoring," Proceedings of the IEEE, vol. 80, no. 12, pp. 1870-1891, dec 1992. (Pubitemid 23612231)
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.12
, pp. 1870-1891
-
-
Hart George, W.1
-
6
-
-
0242369050
-
Power signature analysis
-
mar-apr
-
C. Laughman, K. Lee, R. Cox, S. Shaw, S. Leeb, L. Norford, and P. Armstrong, "Power signature analysis," Power and Energy Magazine, IEEE, vol. 1, no. 2, pp. 56- 63, mar-apr 2003.
-
(2003)
Power and Energy Magazine IEEE
, vol.1
, Issue.2
, pp. 56-63
-
-
Laughman, C.1
Lee, K.2
Cox, R.3
Shaw, S.4
Leeb, S.5
Norford, L.6
Armstrong, P.7
-
7
-
-
84877580836
-
Privacy-preserving smart metering with multiple data consumers
-
C. Rottondi, G. Verticale, and A. Capone, "Privacy-preserving smart metering with multiple data consumers," Computer Networks, 2013. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2013.02.018
-
(2013)
Computer Networks
-
-
Rottondi, C.1
Verticale, G.2
Capone, A.3
-
8
-
-
84880223131
-
Multi-Utility Smart Meters the critical first step in smart grid deployments
-
S. Dutch, "Multi-Utility Smart Meters The critical first step in smart grid deployments," White Paper. [Online]. Available: http://www.electric-words.org/m2m/whitepaper\ sd.pdf
-
White Paper
-
-
Dutch, S.1
-
9
-
-
84880237232
-
-
Protection profile for the gateway of a smart metering system
-
Federal Office for Information Security, "Protection profile for the gateway of a smart metering system," 2011. [Online]. Available: https://www.bsi.bund.de/SharedDocs/Downloads/ DE/BSI/SmartMeter/PP-SmartMeter. pdf
-
(2011)
Federal Office for Information Security
-
-
-
10
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
Springer Berlin / Heidelberg
-
K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Privacy Enhancing Technologies, vol. 6794. Springer Berlin / Heidelberg, 2011, pp. 175-191.
-
(2011)
Privacy Enhancing Technologies 6794
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
11
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in Smart Grid Communications (SmartGridComm) First IEEE Intl. Conf. on, Oct. 2010, pp. 327-332.
-
(2010)
Smart Grid Communications (SmartGridComm) First IEEE Intl. Conf. On, Oct
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
13
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
DOI 10.1007/11761679-29, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our data, ourselves: privacy via distributed noise generation," in Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, ser. EUROCRYPT'06. Berlin, Heidelberg: Springer-Verlag, 2006, pp. 486-503. [Online]. Available: http://dx.doi.org/10. 1007/11761679 29 (Pubitemid 44072257)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
14
-
-
77954421347
-
Efficient secure in-network data aggregation in wireless sensor networks
-
April
-
H. Feng, G. Li, and G. Wang, "Efficient secure in-network data aggregation in wireless sensor networks," in Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on, vol. 1, april 2010, pp. 194-197.
-
(2010)
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
, vol.1
, pp. 194-197
-
-
Feng, H.1
Li, G.2
Wang, G.3
-
15
-
-
62349105999
-
IPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks
-
MILCOM 2008 IEEE, nov. 2008
-
W. He, H. Nguyen, X. Liuy, K. Nahrstedt, and T. Abdelzaher, "iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks," in Military Communications Conference, 2008. MILCOM 2008. IEEE, nov. 2008, pp. 1-7.
-
Military Communications Conference 2008
, pp. 1-7
-
-
He, W.1
Nguyen, H.2
Liuy, X.3
Nahrstedt, K.4
Abdelzaher, T.5
-
16
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: Privacy-preserving data aggregation in wireless sensor networks," in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, may 2007, pp. 2045-2053.
-
INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, May 2007
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
17
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
Feb
-
I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. Kaashoek, F. Dabek, and H. Balakrishnan, "Chord: a scalable peer-to-peer lookup protocol for internet applications," Networking, IEEE/ACM Trans. on, vol. 11, no. 1, Feb. 2003.
-
(2003)
Networking IEEE/ACM Trans. on
, vol.11
, Issue.1
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.4
Kaashoek, M.5
Dabek, F.6
Balakrishnan, H.7
-
18
-
-
38049061546
-
-
J. Katz and M. Yung, Eds Springer Berlin / Heidelberg
-
M. Green and G. Ateniese, "Identity-based proxy re-encryption," in Applied Cryptography and Network Security, ser. Lecture Notes in Computer Science, J. Katz and M. Yung, Eds. Springer Berlin / Heidelberg, 2007, vol. 4521, pp. 288-306.
-
(2007)
Identity-based Proxy Re-encryption in Applied Cryptography and Network Security, Ser. Lecture Notes in Computer Science
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
19
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1-30, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
20
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612- 613, November 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
L. Knudsen, Ed Springer Berlin / Heidelberg, 2002
-
R. Cramer and V. Shoup, "Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption," in Advances in Cryptology EUROCRYPT 2002, ser. Lecture Notes in Computer Science, L. Knudsen, Ed. Springer Berlin / Heidelberg, 2002, vol. 2332, pp. 45-64.
-
Advances in Cryptology EUROCRYPT 2002, Ser. Lecture Notes in Computer Science
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern, Ed Springer Berlin / Heidelberg
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology EUROCRYPT 99, ser. Lecture Notes in Computer Science, J. Stern, Ed. Springer Berlin / Heidelberg, 1999, vol. 1592, pp. 223-238.
-
(1999)
Advances in Cryptology EUROCRYPT 99, Ser. Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
24
-
-
80051653423
-
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
-
IEEE International Conference on, may 2011
-
D. Varodayan and A. Khisti, "Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage," in Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on, may 2011, pp. 1932-1935.
-
(2011)
Acoustics, Speech and Signal Processing (ICASSP)
, pp. 1932-1935
-
-
Varodayan, D.1
Khisti, A.2
-
25
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, "Differential privacy," in Automata, Languages and Programming, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2006, vol. 4052, pp. 1-12. [Online]. Available: http://dx.doi.org/ 10.1007/11787006 1 (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4052
, pp. 1-12
-
-
Dwork, C.1
-
26
-
-
85075489334
-
-
NDSS
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacypreserving aggregation of time-series data," in NDSS, 2011.
-
(2011)
Privacypreserving Aggregation of Time-series Data
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
27
-
-
84890878959
-
Implementation of a protocol for secure distributed aggregation of smart metering data
-
C. Rottondi, M. Savi, D. Polenghi, G. Verticale, and C. Krauß, "Implementation of a protocol for secure distributed aggregation of smart metering data," in IEEE SG-TEP, 1st International Conference on Smart Grid Technologies, Economics and Policies, Dec. 2012.
-
(2012)
IEEE SG-TEP, 1st International Conference on Smart Grid Technologies, Economics and Policies, Dec
-
-
Rottondi, C.1
Savi, M.2
Polenghi, D.3
Verticale, G.4
Krauß, C.5
-
29
-
-
70349100459
-
Packet-oriented communication protocols for smart grid services over low-speed plc
-
ISPLC 2009 IEEE International Symposium on, Apr. 2009
-
M. Bauer, W. Plappert, C. Wang, and K. Dostert, "Packet-oriented communication protocols for smart grid services over low-speed plc," in Power Line Communications and Its Applications, 2009. ISPLC 2009. IEEE International Symposium on, Apr. 2009, pp. 89-94.
-
(2009)
Power Line Communications and Its Applications
, pp. 89-94
-
-
Bauer, M.1
Plappert, W.2
Wang, C.3
Dostert, K.4
-
30
-
-
79960885055
-
A survey of wireless communications for the electric power system
-
Tech. Rep 19084, Jan
-
B. Akyol, H. Kirkham, S. Clements, and M. Hadle, "A survey of wireless communications for the electric power system," Pacific Northwest National Laboratory, Tech. Rep. 19084, Jan. 2010.
-
(2010)
Pacific Northwest National Laboratory
-
-
Akyol, B.1
Kirkham, H.2
Clements, S.3
Hadle, M.4
|