-
1
-
-
84898934872
-
Sesa: An efficient searchable encryption scheme for auction in emerging smart grid marketing
-
M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. S. Shen, & quot;Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing," Security and Communication Networks, 2013.
-
(2013)
Security and Communication Networks
-
-
Wen, M.1
Lu, R.2
Lei, J.3
Li, H.4
Liang, X.5
Shen, X.S.6
-
2
-
-
84899023203
-
An efficient merkle tree based authentication scheme for smart grid
-
H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, & quot;An efficient merkle tree based authentication scheme for smart grid," IEEE Systems Journal, http://ieeexplore.ieee.org/xpl/articleDetails.jsparnumber=6563123.
-
IEEE Systems Journal
-
-
Li, H.1
Lu, R.2
Zhou, L.3
Yang, B.4
Shen, X.5
-
3
-
-
84898948155
-
Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
-
H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, & quot;Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid," IEEE Transactions on Parallel and Distributed Systems, http://www.computer.org/csdl/trans/td/preprint/06506075-abs.html.
-
IEEE Transactions on Parallel and Distributed Systems
-
-
Li, H.1
Lin, X.2
Yang, H.3
Liang, X.4
Lu, R.5
Shen, X.6
-
4
-
-
84877683384
-
Edr: An efficient demand response scheme for achieving forward secrecy in smart grid
-
H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, & quot;Edr: An efficient demand response scheme for achieving forward secrecy in smart grid," in IEEE GLOBECOM, pp. 929-934, 2012.
-
(2012)
IEEE GLOBECOM
, pp. 929-934
-
-
Li, H.1
Liang, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
5
-
-
77956064262
-
Smart transmission grid: Vision and framework
-
F. Li, W. Qiao, H. Sun, H. Wan, J. Wang, Y. Xia, Z. Xu, and P. Zhang, & quot;Smart transmission grid: Vision and framework," IEEE Transactions on Smart Grid, vol. 1, no. 2, pp. 168-177, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.2
, pp. 168-177
-
-
Li, F.1
Qiao, W.2
Sun, H.3
Wan, H.4
Wang, J.5
Xia, Y.6
Xu, Z.7
Zhang, P.8
-
6
-
-
68649100902
-
A break in the clouds: Towards a cloud definition
-
L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, & quot;A break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.39
, Issue.1
, pp. 50-55
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
Caceres, J.3
Lindner, M.4
-
7
-
-
78049366730
-
Outsourcing business to cloud computing services: Opportunities and challenges
-
H. R. Motahari-Nezhad, B. Stephenson, and S. Singhal, & quot;Outsourcing business to cloud computing services: Opportunities and challenges," IEEE Internet Computing, vol. 10, 2009.
-
(2009)
IEEE Internet Computing
, vol.10
-
-
Motahari-Nezhad, H.R.1
Stephenson, B.2
Singhal, S.3
-
8
-
-
84862907810
-
Security challenges for the public cloud
-
K. Ren, C. Wang, and Q. Wang, & quot;Security challenges for the public cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
9
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
D. Boneh and M. Franklin, & quot;Identity-based encryption from the weil pairing," in Advances in CryptologyCRYPTO 2001, pp. 213-229, Springer, 2001.
-
(2001)
Advances in CryptologyCRYPTO
, vol.2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
78650865160
-
Ciphertext policy attribute-based proxy reencryption
-
Springer
-
S. Luo, J. Hu, and Z. Chen, & quot;Ciphertext policy attribute-based proxy reencryption," in Information and Communications Security, pp. 401-415, Springer, 2010.
-
(2010)
Information and Communications Security
, pp. 401-415
-
-
Luo, S.1
Hu, J.2
Chen, Z.3
-
12
-
-
77950251656
-
-
Website at
-
W. Dai, & quot;Crypto++ 5.6. 0 benchmarks," Website at http://www. cryptopp. com/benchmarks. html, 2009.
-
(2009)
Crypto++ 5.6. 0 Benchmarks
-
-
Dai, W.1
-
13
-
-
22244450071
-
The IEEE 802.11 g standard for high data rate wlans
-
D. Vassis, G. Kormentzas, A. Rouskas, and I. Maglogiannis, & quot;The ieee 802.11 g standard for high data rate wlans," IEEE Network, vol. 19, 2005.
-
(2005)
IEEE Network
, vol.19
-
-
Vassis, D.1
Kormentzas, G.2
Rouskas, A.3
Maglogiannis, I.4
-
14
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer
-
A. Sahai and B. Waters, & quot;Fuzzy identity-based encryption," in Advances in Cryptology-EUROCRYPT 2005, pp. 457-473, Springer, 2005.
-
(2005)
Advances in Cryptology-EUROCRYPT
, vol.2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
16
-
-
77952362084
-
Attribute based proxy reencryption with delegating capabilities
-
X. Liang, Z. Cao, H. Lin, and J. Shao, & quot;Attribute based proxy reencryption with delegating capabilities," in ACM Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 276-286, 2009.
-
(2009)
ACM Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
|