메뉴 건너뛰기




Volumn , Issue , 2013, Pages

ESO: An efficient and secure outsourcing scheme for smart grid

Author keywords

attribute based; outsourcing; Proxy re encryption; Smart grid

Indexed keywords

ACCESS CONTROL; COMMERCE; OUTSOURCING; SIGNAL PROCESSING; SMART POWER GRIDS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84898966437     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCSP.2013.6677053     Document Type: Conference Paper
Times cited : (2)

References (16)
  • 1
  • 2
    • 84899023203 scopus 로고    scopus 로고
    • An efficient merkle tree based authentication scheme for smart grid
    • H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, & quot;An efficient merkle tree based authentication scheme for smart grid," IEEE Systems Journal, http://ieeexplore.ieee.org/xpl/articleDetails.jsparnumber=6563123.
    • IEEE Systems Journal
    • Li, H.1    Lu, R.2    Zhou, L.3    Yang, B.4    Shen, X.5
  • 3
    • 84898948155 scopus 로고    scopus 로고
    • Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
    • H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, & quot;Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid," IEEE Transactions on Parallel and Distributed Systems, http://www.computer.org/csdl/trans/td/preprint/06506075-abs.html.
    • IEEE Transactions on Parallel and Distributed Systems
    • Li, H.1    Lin, X.2    Yang, H.3    Liang, X.4    Lu, R.5    Shen, X.6
  • 4
    • 84877683384 scopus 로고    scopus 로고
    • Edr: An efficient demand response scheme for achieving forward secrecy in smart grid
    • H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, & quot;Edr: An efficient demand response scheme for achieving forward secrecy in smart grid," in IEEE GLOBECOM, pp. 929-934, 2012.
    • (2012) IEEE GLOBECOM , pp. 929-934
    • Li, H.1    Liang, X.2    Lu, R.3    Lin, X.4    Shen, X.5
  • 7
    • 78049366730 scopus 로고    scopus 로고
    • Outsourcing business to cloud computing services: Opportunities and challenges
    • H. R. Motahari-Nezhad, B. Stephenson, and S. Singhal, & quot;Outsourcing business to cloud computing services: Opportunities and challenges," IEEE Internet Computing, vol. 10, 2009.
    • (2009) IEEE Internet Computing , vol.10
    • Motahari-Nezhad, H.R.1    Stephenson, B.2    Singhal, S.3
  • 8
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • K. Ren, C. Wang, and Q. Wang, & quot;Security challenges for the public cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
    • (2012) IEEE Internet Computing , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 9
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • D. Boneh and M. Franklin, & quot;Identity-based encryption from the weil pairing," in Advances in CryptologyCRYPTO 2001, pp. 213-229, Springer, 2001.
    • (2001) Advances in CryptologyCRYPTO , vol.2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 10
    • 78650865160 scopus 로고    scopus 로고
    • Ciphertext policy attribute-based proxy reencryption
    • Springer
    • S. Luo, J. Hu, and Z. Chen, & quot;Ciphertext policy attribute-based proxy reencryption," in Information and Communications Security, pp. 401-415, Springer, 2010.
    • (2010) Information and Communications Security , pp. 401-415
    • Luo, S.1    Hu, J.2    Chen, Z.3
  • 12
  • 14
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Springer
    • A. Sahai and B. Waters, & quot;Fuzzy identity-based encryption," in Advances in Cryptology-EUROCRYPT 2005, pp. 457-473, Springer, 2005.
    • (2005) Advances in Cryptology-EUROCRYPT , vol.2005 , pp. 457-473
    • Sahai, A.1    Waters, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.