-
1
-
-
77956607253
-
Opportunities and challenges of wireless sensor networks in smart grid
-
Gungor V, Lu B, Hancke G. Opportunities and challenges of wireless sensor networks in smart grid. Industrial Electronics, IEEE Transactions on 2010; 57(10):3557-3564.
-
(2010)
Industrial Electronics, IEEE Transactions on
, vol.57
, Issue.10
, pp. 3557-3564
-
-
Gungor, V.1
Lu, B.2
Hancke, G.3
-
2
-
-
84894079532
-
-
NIST framework and roadmap for smart grid interoperability standards, release 1.0. Technical Report 1108, National Institute of Standards and Technology
-
NIST framework and roadmap for smart grid interoperability standards, release 1.0. Technical Report 1108, National Institute of Standards and Technology, 2010.
-
(2010)
-
-
-
3
-
-
84869002243
-
Smart grid-the new and improved power grid: a survey
-
Fang X, Misra S, Xue G, Yang D. Smart grid-the new and improved power grid: a survey. Communications Surveys & Tutorials, IEEE 2011; 99:1-37.
-
(2011)
Communications Surveys & Tutorials, IEEE
, vol.99
, pp. 1-37
-
-
Fang, X.1
Misra, S.2
Xue, G.3
Yang, D.4
-
4
-
-
78650124008
-
-
Dynamic pricing and stabilization of supply and demand in modern electric power grids. First IEEE International Conference on Smart Grid Communications, IEEE
-
Roozbehani M, Dahleh M, Mitter S. Dynamic pricing and stabilization of supply and demand in modern electric power grids. First IEEE International Conference on Smart Grid Communications, IEEE, 2010; 543-548.
-
(2010)
, pp. 543-548
-
-
Roozbehani, M.1
Dahleh, M.2
Mitter, S.3
-
5
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
McDaniel P, McLaughlin S. Security and privacy challenges in the smart grid. Security & Privacy, IEEE 2009; 7(3):75-77.
-
(2009)
Security & Privacy, IEEE
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
6
-
-
84874319277
-
A privacy-preserving acceleration authentication protocol for mobile pay-TV systems
-
doi:10.1002/sec.584.
-
Liu X, Zhang Y. A privacy-preserving acceleration authentication protocol for mobile pay-TV systems. Security and Communication Networks 2012. doi:10.1002/sec.584.
-
(2012)
Security and Communication Networks
-
-
Liu, X.1
Zhang, Y.2
-
7
-
-
78149274300
-
AERO: extraction of user's activities from electric power consumption data
-
Cho H, Yamazaki T, Hahn M. AERO: extraction of user's activities from electric power consumption data. Consumer Electronics, IEEE Transactions on 2010; 56(3):2011-2018.
-
(2010)
Consumer Electronics, IEEE Transactions on
, vol.56
, Issue.3
, pp. 2011-2018
-
-
Cho, H.1
Yamazaki, T.2
Hahn, M.3
-
8
-
-
34548301953
-
-
PDA: privacy-preserving data aggregation in wireless sensor networks. The 26th IEEE International Conference on Computer Communications, IEEE
-
He W, Liu X, Nguyen H, Nahrstedt K, Abdelzaher T. PDA: privacy-preserving data aggregation in wireless sensor networks. The 26th IEEE International Conference on Computer Communications, IEEE, 2007; 2045-2053.
-
(2007)
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
9
-
-
51349116601
-
-
Confidentiality protection for distributed sensor data aggregation. The 27th IEEE International Conference on Computer Communications, IEEE
-
Feng T, Wang C, Zhang W, Ruan L. Confidentiality protection for distributed sensor data aggregation. The 27th IEEE International Conference on Computer Communications, IEEE, 2008; 56-60.
-
(2008)
, pp. 56-60
-
-
Feng, T.1
Wang, C.2
Zhang, W.3
Ruan, L.4
-
10
-
-
33748351402
-
Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation
-
Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. Mobile Computing, IEEE Transactions on 2006; 5(10):1417-1431.
-
(2006)
Mobile Computing, IEEE Transactions on
, vol.5
, Issue.10
, pp. 1417-1431
-
-
Westhoff, D.1
Girao, J.2
Acharya, M.3
-
11
-
-
77953308558
-
-
PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. The 29th IEEE International Conference on Computer Communications, IEEE
-
Shi J, Zhang R, Liu Y, Zhang Y. PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. The 29th IEEE International Conference on Computer Communications, IEEE, 2010; 1-9.
-
(2010)
, pp. 1-9
-
-
Shi, J.1
Zhang, R.2
Liu, Y.3
Zhang, Y.4
-
12
-
-
84864583229
-
EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9):1621-1631.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
13
-
-
77952053188
-
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks
-
Lin X, Lu R, Shen X. MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communications and Mobile Computing 2010; 10(6):843-856.
-
(2010)
Wireless Communications and Mobile Computing
, vol.10
, Issue.6
, pp. 843-856
-
-
Lin, X.1
Lu, R.2
Shen, X.3
-
14
-
-
84942550998
-
-
Public-key cryptosystems based on composite degree residuosity classes. The 17th International Conference on Theory and Application of Cryptographic Techniques, Springer
-
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. The 17th International Conference on Theory and Application of Cryptographic Techniques, Springer, 1999; 223-238.
-
(1999)
, pp. 223-238
-
-
Paillier, P.1
-
15
-
-
84874324906
-
-
Identity-based encryption from the Weil pairing. The 21st Annual International Cryptology Conference on Advances in Cryptology, Springer
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. The 21st Annual International Cryptology Conference on Advances in Cryptology, Springer, 2001; 213-229.
-
(2001)
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
16
-
-
26444573086
-
-
Two improved partially blind signature schemes from bilinear pairings. The 10th Australasian conference on Information Security and Privacy, Springer
-
Chow S, Hui L, Yiu S, Chow K. Two improved partially blind signature schemes from bilinear pairings. The 10th Australasian conference on Information Security and Privacy, Springer, 2005; 316-328.
-
(2005)
, pp. 316-328
-
-
Chow, S.1
Hui, L.2
Yiu, S.3
Chow, K.4
-
17
-
-
84976770858
-
Responses to NIST's proposal
-
Rivest R, Hellman M, Anderson J, Lyons J. Responses to NIST's proposal. Communications of the ACM 1992; 35(7):41-54.
-
(1992)
Communications of the ACM
, vol.35
, Issue.7
, pp. 41-54
-
-
Rivest, R.1
Hellman, M.2
Anderson, J.3
Lyons, J.4
-
19
-
-
38149121099
-
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. The First International Conference on Pairing-based Cryptography, Springer
-
Delerablée C, Paillier P, Pointcheval D. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. The First International Conference on Pairing-based Cryptography, Springer, 2007; 39-59.
-
(2007)
, pp. 39-59
-
-
Delerablée, C.1
Paillier, P.2
Pointcheval, D.3
-
20
-
-
35048868592
-
-
The security of DSA and ECDSA. Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, Springer
-
Vaudenay S. The security of DSA and ECDSA. Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography, Springer, 2003; 309-323.
-
(2003)
, pp. 309-323
-
-
Vaudenay, S.1
-
21
-
-
84894024902
-
-
The pairing-based cryptography library.
-
Aitel D. The pairing-based cryptography library. http://crypto.stanford.edu/pbc/
-
-
-
Aitel, D.1
|