-
2
-
-
23044435243
-
Efficient implementations for pairing-based cryptography
-
P. Barreto, B. Lynn, and M. Scott, Efficient implementations for pairing-based cryptography, J. Cryptol. 17 (2004), pp. 321-334.
-
(2004)
J. Cryptol.
, vol.17
, pp. 321-334
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
3
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Advances in Cryptology - CRYPTO '98
-
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes, in CRYPTO'98, LNCS, vol. 1462, 1998, pp. 26-45. (Pubitemid 128118995)
-
(1998)
Lecture notes in computer science
, Issue.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in IEEE S&P'07, 2007, pp. 321-334. (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
78149274300
-
AERO: Extraction of user's activities from electric power consumption data
-
H.S. Cho, T. Yamazaki, and M. Hahn, AERO: Extraction of user's activities from electric power consumption data, IEEE Trans. Consum. Electron. 56 (2010), pp. 2011-2018.
-
(2010)
IEEE Trans. Consum. Electron.
, vol.56
, pp. 2011-2018
-
-
Cho, H.S.1
Yamazaki, T.2
Hahn, M.3
-
7
-
-
80051646795
-
Smart grid privacy via anonymization of smart metering data
-
C. Efthymiou and G. Kalogridis, Smart grid privacy via anonymization of smart metering data, in IEEE SmartGridComm'10, 2010, pp. 238-243.
-
(2010)
IEEE SmartGridComm
, vol.10
, pp. 238-243
-
-
Efthymiou, C.1
Kalogridis, G.2
-
8
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
F.D. Garcia and B. Jacobs, Privacy-friendly energy-metering via homomorphic encryption, in Security and Trust Management, LNCS, vol. 6710, 2011, pp. 226-238.
-
(2011)
Security and Trust Management, LNCS
, vol.6710
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
9
-
-
84894041894
-
Secure data retrieval for decentralized disruption-tolerant military networks
-
in press
-
J. Hur and K. Kang, Secure data retrieval for decentralized disruption-tolerant military networks, IEEE/ACM Trans. Netw., in press.
-
IEEE/ACM Trans. Netw.
-
-
Hur, J.1
Kang, K.2
-
10
-
-
79957993008
-
Decentralizing attribute-based encryption
-
A. Lewko and B. Waters, Decentralizing attribute-based encryption, in EUROCRYPT'11, LNCS, vol. 6632, 2011, pp. 568-588.
-
(2011)
EUROCRYPT 11, LNCS
, vol.6632
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
11
-
-
84894101649
-
Privacy preservation for multicast communication in smart buildings of smart grids
-
D. Li, Z. Aung, S. Sampalli, J.R. Williams, and A. Sanchez, Privacy preservation for multicast communication in smart buildings of smart grids, Smart Grid Renew. Energy, 4 (2013), pp. 313-324.
-
(2013)
Smart Grid Renew. Energy
, vol.4
, pp. 313-324
-
-
Li, D.1
Aung, Z.2
Sampalli, S.3
Williams, J.R.4
Sanchez, A.5
-
12
-
-
84876028271
-
P3: Privacy preservation for appliance control application, in Proceedings of the 3rd
-
Tainan, Nov
-
D. Li, Z. Aung, J.R. Williams, and A. Sanchez, P3: Privacy preservation for appliance control application, in Proceedings of the 3rd IEEE SmartGridComm, 2012, pp. 294-299, Tainan, Nov.
-
(2012)
IEEE SmartGridComm
, pp. 294-299
-
-
Li, D.1
Aung, Z.2
Williams, J.R.3
Sanchez, A.4
-
13
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
F. Li, B. Luo, and P. Liu, Secure information aggregation for smart grids using homomorphic encryption, in SmartGridComm'10, 2010, pp. 327-332.
-
(2010)
SmartGridComm
, vol.10
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
14
-
-
79955950768
-
Compressed meter reading for delay-sensitive and secure load report in smart grid
-
H. Li, R. Mao, L. Lai, and R.C. Qiu, Compressed meter reading for delay-sensitive and secure load report in smart grid, in SmartGridComm'10, 2010, pp. 114-119.
-
(2010)
SmartGridComm
, vol.10
, pp. 114-119
-
-
Li, H.1
Mao, R.2
Lai, L.3
Qiu, R.C.4
-
15
-
-
84894072114
-
A high performance contributory group key management scheme for resource-limited networks
-
D. Li and S. Sampalli, A high performance contributory group key management scheme for resource-limited networks, in International Conference on Wireless Networks, 2010, pp. 1-8.
-
(2010)
International Conference on Wireless Networks
, pp. 1-8
-
-
Li, D.1
Sampalli, S.2
-
16
-
-
77249154055
-
Inferring personal information from demandresponse systems
-
M.A. Lisovich, D.K. Mulligan, and S.B. Wicker, Inferring personal information from demandresponse systems, IEEE Secur. Priv. 8 (2010), pp. 11-20.
-
(2010)
IEEE Secur. Priv.
, vol.8
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
17
-
-
84878116403
-
A key management scheme for secure communications of advanced metering infrastructure in smart grid
-
N. Liu, J. Chen, L. Zhu, J. Zhang, and Y. He, A key management scheme for secure communications of advanced metering infrastructure in smart grid, IEEE Trans. Ind. Elec. 60 (2013), pp. 4746-4756.
-
(2013)
IEEE Trans. Ind. Elec.
, vol.60
, pp. 4746-4756
-
-
Liu, N.1
Chen, J.2
Zhu, L.3
Zhang, J.4
He, Y.5
-
19
-
-
80755168372
-
Protecting consumer privacy from electric load monitoring
-
S. McLaughlin, P. McDaniel, and W. Aiello, Protecting consumer privacy from electric load monitoring, in ACM CCS'11, 2011, pp. 87-98.
-
(2011)
ACM CCS
, vol.11
, pp. 87-98
-
-
McLaughlin, S.1
McDaniel, P.2
Aiello, W.3
-
20
-
-
0004192381
-
-
CRC Press, Boca Raton, FL
-
Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Oorschot Van, C.M.P.1
Vanstone, S.A.2
-
21
-
-
77952887452
-
Security Technology for smart grid networks
-
A.R. Metke and R.L. Ekl, Security Technology for smart grid networks, IEEE Trans. Smart Grid 1 (2010), pp. 99-107.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
22
-
-
79954605963
-
-
NIST Privacy and the Smart Grid, NISTIR 7628, Aug 2010
-
NIST, Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid, NISTIR 7628, Aug 2010.
-
Guidelines for Smart Grid Cyber Security
, vol.2
-
-
-
23
-
-
79954605963
-
-
NIST Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, NISTIR 7628, Aug 2010
-
NIST, Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, NISTIR 7628, Aug 2010.
-
Guidelines for Smart Grid Cyber Security
, vol.1
-
-
-
24
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, in ACM CCS'07, 2007, pp. 195-203.
-
(2007)
ACM CCS'07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
26
-
-
84855849799
-
Smart meter privacy: A utility-privacy framework
-
S.R. Rajagopalan, L. Sankar, S. Mohajer, and H.V. Poor, Smart meter privacy: A utility-privacy framework, in IEEE SmartGridComm'11, 2011, pp. 190-195.
-
(2011)
IEEE SmartGridComm
, vol.11
, pp. 190-195
-
-
Rajagopalan, S.R.1
Sankar, L.2
Mohajer, S.3
Poor, H.V.4
-
27
-
-
80955143493
-
Privacy-preserving smart metering
-
A. Rial and G. Danezis, Privacy-preserving smart metering, in ACM CCS Workshop WPES'11, 2011, pp. 49-60.
-
(2011)
ACM CCS Workshop WPES
, vol.11
, pp. 49-60
-
-
Rial, A.1
Danezis, G.2
-
28
-
-
84855833423
-
Competitive privacy in the smart grid: An information-theoretic approach
-
L. Sankar, S. Kar, R. Tandon, and H.V. Poor, Competitive privacy in the smart grid: An information-theoretic approach, in IEEE SmartGridComm'11, 2011, pp. 220-225.
-
(2011)
IEEE SmartGridComm
, vol.11
, pp. 220-225
-
-
Sankar, L.1
Kar, S.2
Tandon, R.3
Poor, H.V.4
-
29
-
-
79958007491
-
Virtual energy demand data: Estimating energy load and protecting consumers' privacy
-
M. Tomosada and Y. Sinohara, Virtual energy demand data: Estimating energy load and protecting consumers' privacy, in IEEE PES ISGT'11, 2011, pp. 1-8.
-
(2011)
IEEE PES ISGT
, vol.11
, pp. 1-8
-
-
Tomosada, M.1
Sinohara, Y.2
-
30
-
-
84923867231
-
Assessment of Demand Response and Advanced Metering
-
U.S. Department of Energy Aug.
-
U.S. Department of Energy, Assessment of Demand Response and Advanced Metering. Federal Energy Regulatory Commission Report. Aug. 2006, http://www.FERC.gov
-
(2006)
Federal Energy Regulatory Commission Report
-
-
-
31
-
-
70349653420
-
Time valid one-time signature for timecritical multicast data authentication
-
Q. Wang, H. Khurana, Y. Huang, and K. Nahrstedt, Time valid one-time signature for timecritical multicast data authentication, in IEEE INFOCOM'09, 2009, pp. 1233-1241.
-
(2009)
IEEE INFOCOM'09
, pp. 1233-1241
-
-
Wang, Q.1
Khurana, H.2
Huang, Y.3
Nahrstedt, K.4
-
32
-
-
79952970082
-
A privacy-aware architecture for demand response systems
-
S. Wicker and R. Thomas, A privacy-aware architecture for demand response systems, in HICSS'11, 2011, pp. 1-9.
-
(2011)
HICSS
, vol.11
, pp. 1-9
-
-
Wicker, S.1
Thomas, R.2
-
33
-
-
84869385926
-
Minimizing private data disclosures in the smart grid
-
W. Yang, N. Li, Y. Qi, W. Qardaji, S. McLaughlin, and P. McDaniel, Minimizing private data disclosures in the smart grid, in ACM CCS'12, 2012, pp. 415-427.
-
(2012)
ACM CCS
, vol.12
, pp. 415-427
-
-
Yang, W.1
Li, N.2
Qi, Y.3
Qardaji, W.4
McLaughlin, S.5
McDaniel, P.6
-
34
-
-
82155198906
-
Application-aware secure multicast for power grid communication
-
J. Zhang and C.A. Gunter, Application-aware secure multicast for power grid communication, in IEEE SmartGridComm'10, 2010, pp. 339-344.
-
(2010)
IEEE SmartGridComm
, vol.10
, pp. 339-344
-
-
Zhang, J.1
Gunter, C.A.2
|