-
3
-
-
77952134634
-
-
Smart grid at national grid. In Proceeding of ISGT 2010, Gaithersburg, MD, Jan.
-
Forte VJ. Smart grid at national grid. In Proceeding of ISGT 2010, Gaithersburg, MD, Jan. 2010; 1-4.
-
(2010)
, pp. 1-4
-
-
Forte, V.J.1
-
4
-
-
33947369028
-
Distributed intelligent energy management system for a single-phase high-frequency AC microgrid
-
Chakraborty S, Weiss MD, Simoes MG. Distributed intelligent energy management system for a single-phase high-frequency AC microgrid. IEEE Transactions on Industrial Electronics 2007; 54(1): 97-109.
-
(2007)
IEEE Transactions on Industrial Electronics
, vol.54
, Issue.1
, pp. 97-109
-
-
Chakraborty, S.1
Weiss, M.D.2
Simoes, M.G.3
-
5
-
-
84864583229
-
EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9): 1621-1632.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.9
, pp. 1621-1632
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
6
-
-
85184298119
-
-
EDR: an efficient demand response scheme for achieving forward secrecy in smart grid. In Proceedings of 2012 IEEE Global Telecommunications Conference (GLOBECOM 2012), to appear.
-
Li H, Liang X, Lu R, Lin X, Shen X. EDR: an efficient demand response scheme for achieving forward secrecy in smart grid. In Proceedings of 2012 IEEE Global Telecommunications Conference (GLOBECOM 2012), to appear.
-
-
-
Li, H.1
Liang, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
7
-
-
33751106980
-
-
Enhanced anonymous auction protocols with freewheeling bids. In Proceedings of 20th International Conference on Advanced Information Networking and Application (AINA06)
-
Chang YF, Chang CC. Enhanced anonymous auction protocols with freewheeling bids. In Proceedings of 20th International Conference on Advanced Information Networking and Application (AINA06), 2006; 353-358.
-
(2006)
, pp. 353-358
-
-
Chang, Y.F.1
Chang, C.C.2
-
8
-
-
79953037029
-
Practical electronic auction scheme with strong anonymity and bidding privacy
-
Li MJ, Justie STJ, Jennifer HCT. Practical electronic auction scheme with strong anonymity and bidding privacy. Information Sciences 2011; 181(12): 2576-2586.
-
(2011)
Information Sciences
, vol.181
, Issue.12
, pp. 2576-2586
-
-
Li, M.J.1
Justie, S.T.J.2
Jennifer, H.C.T.3
-
9
-
-
77950864045
-
Proxy re-encryption with keyword search
-
Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Information Sciences 2010; 180(13): 2576-2587.
-
(2010)
Information Sciences
, vol.180
, Issue.13
, pp. 2576-2587
-
-
Shao, J.1
Cao, Z.2
Liang, X.3
Lin, H.4
-
10
-
-
32144447606
-
Network constraint impacts on the competitive electrically markets under supply-side strategic bidding
-
Bompard E, Lu W, Napoli R. Network constraint impacts on the competitive electrically markets under supply-side strategic bidding. IEEE Transactions on Power Systems 2006; 21(1): 160-170.
-
(2006)
IEEE Transactions on Power Systems
, vol.21
, Issue.1
, pp. 160-170
-
-
Bompard, E.1
Lu, W.2
Napoli, R.3
-
11
-
-
84864865604
-
Securing smart grid: cyber attacks, countermeasures and challenges
-
Li X, Liang X, Lu R, Lin X, Zhu H, Shen X. Securing smart grid: cyber attacks, countermeasures and challenges. IEEE Communications Magazine 2012; 50(8): 38-45.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.8
, pp. 38-45
-
-
Li, X.1
Liang, X.2
Lu, R.3
Lin, X.4
Zhu, H.5
Shen, X.6
-
12
-
-
1642268122
-
An improvement of generation firm's bidding strategies based on conjectural variation regulation via dynamic learning
-
Song Y, Ni Y, Wen F. An improvement of generation firm's bidding strategies based on conjectural variation regulation via dynamic learning. In proceedings of the CSEE 2003; 23(12): 23-27.
-
(2003)
In proceedings of the CSEE
, vol.23
, Issue.12
, pp. 23-27
-
-
Song, Y.1
Ni, Y.2
Wen, F.3
-
13
-
-
33846845187
-
Supplier bidding strategy based on non-cooperative game theory concepts in single auction power pools
-
Kanga DJ, Kimb BH, Hur D. Supplier bidding strategy based on non-cooperative game theory concepts in single auction power pools. Electric Power Systems Research 2007; 77(5-6): 630-636.
-
(2007)
Electric Power Systems Research
, vol.77
, Issue.5-6
, pp. 630-636
-
-
Kanga, D.J.1
Kimb, B.H.2
Hur, D.3
-
14
-
-
33644606618
-
An electronic online bidding auction protocol with both security and efficiency
-
Liaw HT, Juang WS, Lin CK. An electronic online bidding auction protocol with both security and efficiency. Applied Mathematics and Computation 2006; 174(2): 1487-1497.
-
(2006)
Applied Mathematics and Computation
, vol.174
, Issue.2
, pp. 1487-1497
-
-
Liaw, H.T.1
Juang, W.S.2
Lin, C.K.3
-
15
-
-
70749116607
-
-
An efficient privacy preserving keyword search scheme in cloud computing. In Proceeding of 2009 International Conference on Computational Science and Engineering
-
Liu Q, Wang G, Wu J. An efficient privacy preserving keyword search scheme in cloud computing. In Proceeding of 2009 International Conference on Computational Science and Engineering, 2009; 715-720.
-
(2009)
, pp. 715-720
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
16
-
-
35048901123
-
-
Public key encryption with keyword search. In Proceeding of EUROCRYPT. LNCS, vol. 3027
-
Boneh D, Crescenzo DG, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proceeding of EUROCRYPT 2004. LNCS, vol. 3027, 506-522.
-
(2004)
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, D.G.2
Ostrovsky, R.3
Persiano, G.4
-
17
-
-
84860853220
-
Towards secure targeted broadcast in smart grid
-
Fadlullah ZM, Kato N, Lu R, Shen X, Nozaki Y. Towards secure targeted broadcast in smart grid. IEEE Communications Magazine 2012; 50(5): 150-156.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.5
, pp. 150-156
-
-
Fadlullah, Z.M.1
Kato, N.2
Lu, R.3
Shen, X.4
Nozaki, Y.5
-
18
-
-
82155185209
-
A light-weight message authentication scheme for smart grid communications
-
Fouda M, Fadlullah ZM, Kato N, Lu R, Shen X. A light-weight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid 2011; 2(4): 675-685.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 675-685
-
-
Fouda, M.1
Fadlullah, Z.M.2
Kato, N.3
Lu, R.4
Shen, X.5
-
19
-
-
84885891567
-
-
An efficient searchable encryption scheme and its application in network forensics. In Proceeding of E-Forensics, LNICST 56
-
Lin X, Lu R, Foxton K, Shen X. An efficient searchable encryption scheme and its application in network forensics. In Proceeding of E-Forensics 2010, LNICST 56, 66-78.
-
(2010)
, pp. 66-78
-
-
Lin, X.1
Lu, R.2
Foxton, K.3
Shen, X.4
-
20
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
Zhang B, Zhang FG. An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications 2011; 34(1): 262-267.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.G.2
-
21
-
-
23044435711
-
Short signatures from the Weil pairing
-
Dan B, Ben L, Hovav S. Short signatures from the Weil pairing. Journal of Cryptology 2004; 17(4): 297-319.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Dan, B.1
Ben, L.2
Hovav, S.3
-
22
-
-
84894103229
-
-
Efficient implementation of cryptographic pairings. Available
-
Scott M. Efficient implementation of cryptographic pairings. Available: http://ecrypt-ss07.rhul.ac.uk/Slides/Thursday/mscottsamos07.pdf
-
-
-
Scott, M.1
-
23
-
-
84894054381
-
-
Shamus software
-
Shamus software. http://www.shamus.ie/index.php?page=Benchmarks.
-
-
-
-
24
-
-
84894077653
-
-
The exact security of an identity based signature and its applications. Preprint available at
-
Libert B, Quisquater JJ. The exact security of an identity based signature and its applications. Preprint available at http://eprint.iacr.org/2004/102.
-
-
-
Libert, B.1
Quisquater, J.J.2
-
25
-
-
34547358080
-
Pairings
-
Chapter 9, Cambridge University Press: New York, NY, USA
-
Galbraith SD. Pairings. Advances in Elliptic Curve Cryptography, Chapter 9, Cambridge University Press: New York, NY, USA; 2005; 183-213.
-
(2005)
Advances in Elliptic Curve Cryptography
, pp. 183-213
-
-
Galbraith, S.D.1
|