-
1
-
-
52349119748
-
-
Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, doi:10.1109/PES.2008.4596535.
-
Cleveland F. Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, 2008; 1-5. doi:10.1109/PES.2008.4596535.
-
(2008)
, pp. 1-5
-
-
Cleveland, F.1
-
2
-
-
0026970695
-
Nonintrusive appliance load monitoring
-
doi:10.1109/5.192069.
-
Hart G. Nonintrusive appliance load monitoring. Proceedings of the IEEE 1992; 80(12):1870-1891. doi:10.1109/5.192069.
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.12
, pp. 1870-1891
-
-
Hart, G.1
-
3
-
-
84894062853
-
-
Privacy and the new energy infrastructure. Social Science Research Network (SSRN), February.
-
Quinn E. Privacy and the new energy infrastructure. Social Science Research Network (SSRN), February 2009.
-
(2009)
-
-
Quinn, E.1
-
4
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
Springer-Verlag: Berlin, Heidelberg, URL
-
Kursawe K, Danezis G, Kohlweiss M. Privacy-friendly aggregation for the smart-grid. In Proceedings of the 11th International Conference on Privacy Enhancing Technologies, PETS'11. Springer-Verlag: Berlin, Heidelberg, 2011; 175-191. URL http://dl.acm.org/citation.cfm?id=2032162.2032172.
-
(2011)
Proceedings of the 11th International Conference on Privacy Enhancing Technologies, PETS'11
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
5
-
-
80051646795
-
-
Smart grid privacy via anonymization of smart metering data. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622050.
-
Efthymiou C, Kalogridis G. Smart grid privacy via anonymization of smart metering data. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 238-243. doi:10.1109/SMARTGRID.2010.5622050.
-
(2010)
, pp. 238-243
-
-
Efthymiou, C.1
Kalogridis, G.2
-
6
-
-
78650887542
-
Private memoirs of a smart meter
-
ACM: New York, NY, USA, doi:10.1145/1878431.1878446. URL
-
Molina-Markham A, Shenoy P, Fu K, Cecchet E, Irwin D. Private memoirs of a smart meter. In Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys '10. ACM: New York, NY, USA, 2010; 61-66. doi:10.1145/1878431.1878446. URL http://doi.acm.org/10.1145/1878431.1878446.
-
(2010)
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys '10
, pp. 61-66
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
7
-
-
77954893607
-
-
A privacy model for smart metering. 2010 IEEE International Conference on Communications Workshops (ICC), doi:10.1109/ICCW.2010.5503916.
-
Bohli JM, Sorge C, Ugus O. A privacy model for smart metering. 2010 IEEE International Conference on Communications Workshops (ICC), 2010; 1-5. doi:10.1109/ICCW.2010.5503916.
-
(2010)
, pp. 1-5
-
-
Bohli, J.M.1
Sorge, C.2
Ugus, O.3
-
8
-
-
80051651344
-
-
Privacy for smart meters: towards undetectable appliance load signatures. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622047.
-
Kalogridis G, Efthymiou C, Denic S, Lewis T, Cepeda R. Privacy for smart meters: towards undetectable appliance load signatures. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 232-237. doi:10.1109/SMARTGRID.2010.5622047.
-
(2010)
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.3
Lewis, T.4
Cepeda, R.5
-
9
-
-
80051653423
-
-
Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage. ICASSP, IEEE, URL
-
Varodayan DP, Khisti A. Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage. ICASSP, IEEE, 2011; 1932-1935. URL http://dblp.uni-trier.de/db/conf/icassp/icassp2011.htmlVarodayanK11.
-
(2011)
, pp. 1932-1935
-
-
Varodayan, D.P.1
Khisti, A.2
-
10
-
-
80755168372
-
Protecting consumer privacy from electric load monitoring
-
ACM: New York, NY, USA, doi:10.1145/2046707.2046720. URL
-
McLaughlin S, McDaniel P, Aiello W. Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11. ACM: New York, NY, USA, 2011; 87-98, doi:10.1145/2046707.2046720. URL http://doi.acm.org/10.1145/2046707.2046720.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 87-98
-
-
McLaughlin, S.1
McDaniel, P.2
Aiello, W.3
-
11
-
-
80053020495
-
I have a dream!: differentially private smart metering
-
Springer-Verlag: Berlin, Heidelberg, URL
-
Ács G, Castelluccia C. I have a dream!: differentially private smart metering. In Proceedings of the 13th International Conference on Information Hiding, IH'11. Springer-Verlag: Berlin, Heidelberg, 2011; 118-132. URL http://dl.acm.org/citation.cfm?id=2042445.2042457.
-
(2011)
Proceedings of the 13th International Conference on Information Hiding, IH'11
, pp. 118-132
-
-
Ács, G.1
Castelluccia, C.2
-
12
-
-
84894084566
-
-
Protecting customer privacy in smart grid by coupling asymmetric cryptography with anonimized usage data, white paper. Infosys Technologies Ltd., May.
-
Bisoi S. Protecting customer privacy in smart grid by coupling asymmetric cryptography with anonimized usage data, white paper. Infosys Technologies Ltd., May 2011.
-
(2011)
-
-
Bisoi, S.1
-
13
-
-
82155177539
-
-
Secure lossless aggregation for smart grid m2m networks. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622063.
-
Bartoli A, Hernandez-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D. Secure lossless aggregation for smart grid m2m networks. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 333-338. doi:10.1109/SMARTGRID.2010.5622063.
-
(2010)
, pp. 333-338
-
-
Bartoli, A.1
Hernandez-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
14
-
-
80051631772
-
-
Secure information aggregation for smart grids using homomorphic encryption. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), doi:10.1109/SMARTGRID.2010.5622064.
-
Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 327-332. doi:10.1109/SMARTGRID.2010.5622064.
-
(2010)
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
15
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
Springer-Verlag: Berlin, Heidelberg, URL
-
Garcia FD, Jacobs B. Privacy-friendly energy-metering via homomorphic encryption. In Proceedings of the 6th International Conference on Security and Trust Management, STM'10. Springer-Verlag: Berlin, Heidelberg, 2011; 226-238. URL http://dl.acm.org/citation.cfm?id=2050149.2050164.
-
(2011)
Proceedings of the 6th International Conference on Security and Trust Management, STM'10
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
16
-
-
84864360304
-
-
Performance evaluation of smart grid data aggregation via homomorphic encryption. Wireless Communications and Networking Conference (WCNC), 2012 IEEE, doi:10.1109/WCNC.2012.6214307.
-
Saputro N, Akkaya K. Performance evaluation of smart grid data aggregation via homomorphic encryption. Wireless Communications and Networking Conference (WCNC), 2012 IEEE, 2012; 2945-2950. doi:10.1109/WCNC.2012.6214307.
-
(2012)
, pp. 2945-2950
-
-
Saputro, N.1
Akkaya, K.2
-
17
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
doi:10.1155/2007/13801. URL
-
Fontaine C, Galand F. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007; 2007: 15:1-15:15. doi:10.1155/2007/13801. URL http://dx.doi.org/10.1155/2007/13801.
-
(2007)
EURASIP Journal on Information Security
, vol.2007
, pp. 1-15
-
-
Fontaine, C.1
Galand, F.2
-
18
-
-
84937439454
-
Trapdooring discrete logarithms on elliptic curves over rings
-
Springer-Verlag: London, UK, UK, URL
-
Paillier P. Trapdooring discrete logarithms on elliptic curves over rings. In Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '00. Springer-Verlag: London, UK, UK, 2000; 573-584. URL http://dl.acm.org/citation.cfm?id=647096.716885.
-
(2000)
Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '00
, pp. 573-584
-
-
Paillier, P.1
-
19
-
-
11244267013
-
-
Springer-Verlag New York, Inc.: Secaucus, NJ, USA
-
Hankerson D, Menezes AJ, Vanstone S. Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc.: Secaucus, NJ, USA, 2003.
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.3
-
21
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
vol. 1403, Nyberg K (ed.). Springer: Berlin, Heidelberg, doi:10.1007/BFb0054135. URL
-
Okamoto T, Uchiyama S. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology EUROCRYPT'98, Lecture Notes in Computer Science, vol. 1403, Nyberg K (ed.). Springer: Berlin, Heidelberg, 1998; 308-318. doi:10.1007/BFb0054135. URL http://dx.doi.org/10.1007/BFb0054135.
-
(1998)
Advances in Cryptology EUROCRYPT'98, Lecture Notes in Computer Science
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
22
-
-
0032218237
-
A new public key cryptosystem based on higher residues
-
ACM: New York, NY, USA, doi:10.1145/288090.288106. URL
-
Naccache D, Stern J. A new public key cryptosystem based on higher residues. In Proceedings of the 5th ACM Conference on Computer and Communications Security, CCS '98. ACM: New York, NY, USA, 1998; 59-66. doi:10.1145/288090.288106. URL http://doi.acm.org/10.1145/288090.288106.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security, CCS '98
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21:120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
24
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Springer-Verlag New York, Inc.: New York, NY, USA, URL
-
El Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of CRYPTO 84 on Advances in Cryptology. Springer-Verlag New York, Inc.: New York, NY, USA, 1985; 10-18. URL http://dl.acm.org/citation.cfm?id=19478.19480.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 10-18
-
-
El Gamal, T.1
-
25
-
-
84945300542
-
A provably secure additive and multiplicative privacy homomorphism
-
Springer-Verlag: London, UK, UK, URL
-
Domingo-Ferrer J. A provably secure additive and multiplicative privacy homomorphism. In Proceedings of the 5th International Conference on Information Security, ISC '02. Springer-Verlag: London, UK, UK, 2002; 471-483. URL http://dl.acm.org/citation.cfm?id=648026.744660.
-
(2002)
Proceedings of the 5th International Conference on Information Security, ISC '02
, pp. 471-483
-
-
Domingo-Ferrer, J.1
-
26
-
-
33749525209
-
-
Efficient aggregation of encrypted data in wireless sensor networks. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005, doi:10.1109/MOBIQUITOUS.2005.25.
-
Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005, 2005; 109-117. doi:10.1109/MOBIQUITOUS.2005.25.
-
(2005)
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
27
-
-
82155166461
-
Differentiated services QoS in smart grid communication networks
-
doi:10.1002/bltj.20522. URL
-
Deshpande JG, Kim E, Thottan M. Differentiated services QoS in smart grid communication networks. Bell Labs Technical Journal 2011; 16(3): 61-81. doi:10.1002/bltj.20522. URL http://dx.doi.org/10.1002/bltj.20522.
-
(2011)
Bell Labs Technical Journal
, vol.16
, Issue.3
, pp. 61-81
-
-
Deshpande, J.G.1
Kim, E.2
Thottan, M.3
-
28
-
-
84894093311
-
-
DOE. Communications requirements of smart grid technologies, Oct.
-
DOE. Communications requirements of smart grid technologies, Oct 2010.
-
(2010)
-
-
-
29
-
-
84894099792
-
-
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. 2nd Workshop on Embedded Systems Security (WESS)
-
Ugus O, Westhoff D, Laue R, Shoufan A, Huss SA. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. 2nd Workshop on Embedded Systems Security (WESS), 2007.
-
(2007)
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
30
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
doi:10.1109/MWC.2004.1269719.
-
Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 2004; 11(1):62-67. doi:10.1109/MWC.2004.1269719.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
31
-
-
42549159545
-
-
Public key based cryptoschemes for data concealment in wireless sensor networks. IEEE International Conference on Communications, 2006, ICC '06, vol. 5, doi:10.1109/ICC.2006.255111.
-
Mykletun E, Girao J, Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks. IEEE International Conference on Communications, 2006, ICC '06, vol. 5, 2006; 2288-2295. doi:10.1109/ICC.2006.255111.
-
(2006)
, pp. 2288-2295
-
-
Mykletun, E.1
Girao, J.2
Westhoff, D.3
-
32
-
-
84875313714
-
Mapping an arbitrary message to an elliptic curve when defined over gf (2n)
-
King B. Mapping an arbitrary message to an elliptic curve when defined over gf (2n). International Journal of Network Security 2009; 8(2):169-176.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 169-176
-
-
King, B.1
-
33
-
-
85099494272
-
On Karatsuba multiplication algorithm
-
IEEE Computer Society: Washington, DC, USA, doi:10.1109/ISDPE.2007.92. URL
-
Fang X, Li L. On Karatsuba multiplication algorithm. In Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, ISDPE '07. IEEE Computer Society: Washington, DC, USA, 2007; 274-276. doi:10.1109/ISDPE.2007.92. URL http://dx.doi.org/10.1109/ISDPE.2007.92.
-
(2007)
Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, ISDPE '07
, pp. 274-276
-
-
Fang, X.1
Li, L.2
|