-
1
-
-
84864269911
-
Energy services for the smart grid city
-
Campione d'Italia, Italy, June
-
Karnouskos S, Silva PGD, Ilic D. Energy services for the smart grid city, In Proceedings IEEE International Conference on Digital Ecosystem Technologies-Complex Environment Engineering (DEST-CEE), Campione d'Italia, Italy, June 2012; 1-6.
-
(2012)
Proceedings IEEE International Conference on Digital Ecosystem Technologies-Complex Environment Engineering (DEST-CEE)
, pp. 1-6
-
-
Karnouskos, S.1
Silva, P.G.D.2
Ilic, D.3
-
2
-
-
84900639708
-
Cyber Security Working Group, Guidelines for smart grid cyber security
-
Smart Grid Interoperability Panel, Interagency Rep. 7628, August, [4 September 2013]
-
Smart Grid Interoperability Panel, Cyber SecurityWorking Group, Guidelines for smart grid cyber security: Vol. 1, smart grid cyber security strategy, architecture, and high-level requirements, and Vol. 2, privacy and the smart grid, National Institute of Standards and Technology (NIST). Interagency Rep. 7628, August 2010. Available from: http://csrc.nist.gov/publications/ nistir/ir7628/nistir-7628-vol1.pdf [4 September 2013].
-
(2010)
Smart Grid Cyber Security Strategy, Architecture, and High-level Requirements, and Vol. 2, Privacy and the Smart Grid, National Institute of Standards and Technology (NIST)
, vol.1
-
-
-
3
-
-
80051634046
-
Privacy and the new energy infrastructure
-
working paper no. 09 - 001, [4 September 2013]
-
Quinn EL. Privacy and the new energy infrastructure. Center for Energy and Environmental Security (CEES), working paper no. 09 - 001, 2008, 1-47. Available from: http://papers.ssrn.com/sol3/papers.cfm?abstract-id=1370731.[4 September 2013].
-
(2008)
Center for Energy and Environmental Security (CEES)
, pp. 1-47
-
-
Quinn, E.L.1
-
5
-
-
79954610963
-
Smartprivacy for the smart grid: Embedding privacy into the design of electricity conservation
-
Cavoukian A, Polonetsky J, Wolf C. Smartprivacy for the smart grid: Embedding privacy into the design of electricity conservation. Identity, Information Society 2010; 3(2): 275-294.
-
(2010)
Identity, Information Society
, vol.3
, Issue.2
, pp. 275-294
-
-
Cavoukian, A.1
Polonetsky, J.2
Wolf, C.3
-
6
-
-
0038039365
-
Dynamic energyconsumption indicators for domestic appliances: Environment, behaviour and design
-
Wood G, Newborough M. Dynamic energyconsumption indicators for domestic appliances: Environment, behaviour and design. Energy, Building 2003; 35(8): 821-841.
-
(2003)
Energy, Building
, vol.35
, Issue.8
, pp. 821-841
-
-
Wood, G.1
Newborough, M.2
-
7
-
-
12444337118
-
-
2nd ed. Addison-Wesley Professional: Boston, MA
-
Adams C, Lloyd S. Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd ed. Addison-Wesley Professional: Boston, MA, 2002.
-
(2002)
Understanding PKI: Concepts, Standards, and Deployment Considerations
-
-
Adams, C.1
Lloyd, S.2
-
9
-
-
84900620359
-
Introduction to privacy technology, Katholieke Universiteit Leuven
-
[4 September 2013]
-
Danezis G. Introduction to privacy technology, Katholieke Universiteit Leuven, Computer Security and Industrial Cryptography (COSIC) Res. Talk, 2007. Available from: http://research.microsoft.com/en-us/um/people/gdane/talks/ Privacy-Technology-cosic.pdf [4 September 2013].
-
(2007)
Computer Security and Industrial Cryptography (COSIC) Res. Talk
-
-
Danezis, G.1
-
10
-
-
84874418342
-
Overview of the block cipher
-
Hangzhou, China, October
-
Cheng H, Ding Q. Overview of the block cipher, In Proceedings International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), Hangzhou, China, October 2012; 1628-1631.
-
(2012)
Proceedings International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC)
, pp. 1628-1631
-
-
Cheng, H.1
Ding, Q.2
-
11
-
-
84873838489
-
Research on design principles of elliptic curve public key cryptography and its implementation
-
Nanjing, China, August
-
Qing-hai B, Wen-bo Z, Peng J, Xu L. Research on design principles of elliptic curve public key cryptography and its implementation, In Proceedings IEEE International Conference on Computer Science and Service System (CSSS), Nanjing, China, August 2012; 1224-1227.
-
(2012)
Proceedings IEEE International Conference on Computer Science and Service System (CSSS)
, pp. 1224-1227
-
-
Qing-Hai, B.1
Wen-Bo, Z.2
Peng, J.3
Xu, L.4
-
12
-
-
84900635764
-
TinyObf: Code obfuscation framework for wireless sensor networks
-
Las Vegas, NV, July
-
Costa R, Pirmez L, Boccardo D, Rust LF, Machado R. TinyObf: code obfuscation framework for wireless sensor networks, In Proceedings International Conference onWireless Networks (ICWN), Las Vegas, NV, July 2012; 68-74.
-
(2012)
Proceedings International Conference OnWireless Networks (ICWN)
, pp. 68-74
-
-
Costa, R.1
Pirmez, L.2
Boccardo, D.3
Rust, L.F.4
Machado, R.5
-
13
-
-
84864875978
-
A key management framework for AMI networks in smart grid
-
Das S, Ohba Y, Kanda M, Famolari D, Das SK. A key management framework for AMI networks in smart grid. IEEE Communications Magazine 2012; 50(8): 30-37.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.8
, pp. 30-37
-
-
Das, S.1
Ohba, Y.2
Kanda, M.3
Famolari, D.4
Das, S.K.5
-
14
-
-
84878116403
-
A key management scheme for secure communications of advanced metering infrastructure in smart grid
-
Liu N, Chen J, Zhu L, Zhang J, He Y. A key management scheme for secure communications of advanced metering infrastructure in smart grid. IEEE Transactions on Industrial Electronics 2013; 60(b): 4746-4756.
-
(2013)
IEEE Transactions on Industrial Electronics
, vol.60
, pp. 4746-4756
-
-
Liu, N.1
Chen, J.2
Zhu, L.3
Zhang, J.4
He, Y.5
-
15
-
-
84877675940
-
Zigbee/Zigbee PRO security assessment based on compromised cryptographic keys
-
Fukuoka, Japan, November
-
Radmand P, Domingo M, Singh J, Arnedo J, Talevski A, Petersen S, Carlsen S. Zigbee/Zigbee PRO security assessment based on compromised cryptographic keys, In Proceedings International Conference on P2P, Parallel Grid, Cloud and Internet Computing (3PGCIC), Fukuoka, Japan, November 2010; 465-470.
-
(2010)
Proceedings International Conference on P2P, Parallel Grid, Cloud and Internet Computing (3PGCIC)
, pp. 465-470
-
-
Radmand, P.1
Domingo, M.2
Singh, J.3
Arnedo, J.4
Talevski, A.5
Petersen, S.6
Carlsen, S.7
-
16
-
-
2642544584
-
From a trickle to a flood: Active attacks on several mix types
-
Springer-Verlag, Berlin, Heidelberg
-
Serjantov A, Dingledine R, Syverson P. From a trickle to a flood: Active attacks on several mix types, In Proceedings Information Hiding Workshop (IH), Springer-Verlag, Berlin, Heidelberg, 2002; 36-52.
-
(2002)
Proceedings Information Hiding Workshop (IH)
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
17
-
-
85084161366
-
Tor: The second-generation onion router
-
Berkeley, CA
-
Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router, In Proceedings Conference USENIX Security Symposium, Berkeley, CA, 2004; 21-21.
-
(2004)
Proceedings Conference USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
19
-
-
84911907835
-
On collaborative anonymous communications in lossy networks
-
in press, [4 September 2013]
-
Rebollo-Monedero D, Forné J, Pallarès E, Parra-Arnau J, Tripp C, Urquiza L, Aguilar M. On collaborative anonymous communications in lossy networks. Security and Communication Network, Special Issue Secure. Completely Interconnected World 2013 in press. Available from: http://dx.doi.org/10.1002/sec.793 [4 September 2013].
-
(2013)
Security and Communication Network, Special Issue Secure. Completely Interconnected World
-
-
Rebollo-Monedero, D.1
Forné, J.2
Pallarès, E.3
Parra-Arnau, J.4
Tripp, C.5
Urquiza, L.6
Aguilar, M.7
-
20
-
-
84949807262
-
-
Survey Methodology. John Wiley & Sons: West Sussex, UK
-
Hundepool A, Domingo-Ferrer J, Franconi L, Giessing S, Nordholt ES, Spicer K, deWolf PP. Statistical Disclosure Control, Survey Methodology. John Wiley & Sons: West Sussex, UK, 2012.
-
(2012)
Statistical Disclosure Control
-
-
Hundepool, A.1
Domingo-Ferrer, J.2
Franconi, L.3
Giessing, S.4
Nordholt, E.S.5
Spicer, K.6
Dewolf, P.P.7
-
21
-
-
0011584005
-
Uniqueness of simple demographics in the U.S. Population
-
Carnegie Mellon Univ., Sch. Comput. Sci., Data Priv. Lab., Pittsburgh, PA
-
Sweeney L. Uniqueness of simple demographics in the U.S. population. Tech. Rep. LIDAP-WP4, Carnegie Mellon Univ., Sch. Comput. Sci., Data Priv. Lab., Pittsburgh, PA, 2000.
-
(2000)
Tech. Rep. LIDAP-WP4
-
-
Sweeney, L.1
-
24
-
-
26944448516
-
Ordinal, continuous and heterogenerous k-anonymity through microaggregation
-
Domingo-Ferrer J, Torra V. Ordinal, continuous and heterogenerous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 2005; 11(2): 195-212.
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
25
-
-
36048972384
-
Efficient multivariate data-oriented microaggregation
-
Domingo-Ferrer J, Martínez-Ballesté A, Mateo-Sanz JM, Sebé F. Efficient multivariate data-oriented microaggregation. VLDB Journal 2006; 15(4): 355-369.
-
(2006)
VLDB Journal
, vol.15
, Issue.4
, pp. 355-369
-
-
Domingo-Ferrer, J.1
Martínez-Ballesté, A.2
Mateo-Sanz, J.M.3
Sebé, F.4
-
26
-
-
84870058770
-
A modification of the Lloyd algorithm for kanonymous quantization
-
[4 September 2013]
-
Rebollo-Monedero D, Forné J, Pallarès E, Parra-Arnau J. A modification of the Lloyd algorithm for kanonymous quantization. Information Sciences 2013; 222: 185-202. Available from: http://dx.doi.org/10.1016/j.ins. 2012.08.022 [4 September 2013].
-
(2013)
Information Sciences
, vol.222
, pp. 185-202
-
-
Rebollo-Monedero, D.1
Forné, J.2
Pallarès, E.3
Parra-Arnau, J.4
-
27
-
-
80051799598
-
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers
-
Rebollo-Monedero D, Forné J, Soriano M. An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers. Data & Knowledge Engineering 2011; 70(10): 892-921. Available from: http://dx.doi.org/10.1016/j.datak.2011.06.005.
-
(2011)
Data & Knowledge Engineering
, vol.70
, Issue.10
, pp. 892-921
-
-
Rebollo-Monedero, D.1
Forné, J.2
Soriano, M.3
-
28
-
-
84866917238
-
-
Ph.D. dissertation, Katholieke Univ. Leuven, Dept. Elect. Eng. (ESAT)
-
Deng M. Privacy preserving content protection, Ph.D. dissertation, Katholieke Univ. Leuven, Dept. Elect. Eng. (ESAT), 2010.
-
(2010)
Privacy Preserving Content Protection
-
-
Deng, M.1
-
29
-
-
77955802941
-
Optimal query forgery for private information retrieval
-
[4 September 2013]
-
Rebollo-Monedero D, Forné J. Optimal query forgery for private information retrieval. IEEE Transactions on Information Theory 2010; 56(9): 4631-4642. Available from: http://dx.doi.org/10.1109/TIT.2010.2054471 [4 September 2013].
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.9
, pp. 4631-4642
-
-
Rebollo-Monedero, D.1
Forné, J.2
-
30
-
-
84864765349
-
A privacy-protecting architecture for recommendation systems via the suppression of ratings
-
Parra-Arnau J, Rebollo-Monedero D, Forné J. A privacy-protecting architecture for recommendation systems via the suppression of ratings. Journal: International Journal of Security and Its Applications (IJSIA), Science & Engineering Research Support Society (SERSS) 2012; 6(2): 61-80.
-
(2012)
Journal: International Journal of Security and its Applications (IJSIA), Science & Engineering Research Support Society (SERSS)
, vol.6
, Issue.2
, pp. 61-80
-
-
Parra-Arnau, J.1
Rebollo-Monedero, D.2
Forné, J.3
-
31
-
-
84864742451
-
Coprivate query profile obfuscation by means of opti-mal query exchange between users
-
[4 September 2013]
-
Rebollo-Monedero D, Forné J, Domingo-Ferrer J. Coprivate query profile obfuscation by means of opti-mal query exchange between users. Journal: IEEE Transactions on Dependable and Secure Computing, Special Issue on Data and Application Security (DAS) 2012; 9(5): 641-654. Available from: http://doi.ieeecomputersociety.org/10.1109/TDSC.2012.16 [4 September 2013].
-
(2012)
Journal: IEEE Transactions on Dependable and Secure Computing, Special Issue on Data and Application Security (DAS)
, vol.9
, Issue.5
, pp. 641-654
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
32
-
-
84873169488
-
-
(Lipton RJ, Dobkin DP, Jones AK, eds). Academic Press, Inc.: Orlando, FL
-
DeMillo RA. Foundations of Secure Computation (Lipton RJ, Dobkin DP, Jones AK, eds). Academic Press, Inc.: Orlando, FL, 1978.
-
(1978)
Foundations of Secure Computation
-
-
Demillo, R.A.1
-
33
-
-
84874813956
-
Privacy-enhanced architecture for smart metering
-
Mármol F, Sorge C, Petrlic R, Ugus O, Westhoff D, Pérez G. Privacy-enhanced architecture for smart metering. International Journal of Information Security 2013; 12(2): 67-82.
-
(2013)
International Journal of Information Security
, vol.12
, Issue.2
, pp. 67-82
-
-
Mármol, F.1
Sorge, C.2
Petrlic, R.3
Ugus, O.4
Westhoff, D.5
Pérez, G.6
-
34
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
Athens, Greece
-
Garcia FD, Jacobs B. Privacy-friendly energy-metering via homomorphic encryption, In Proc. Int. Workshop Secur., Trust Mgmt. (STM), Athens, Greece, 2010; 226-238.
-
(2010)
Proc. Int. Workshop Secur., Trust Mgmt. (STM)
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
35
-
-
82155177539
-
Secure lossless aggregation for smart grid M2M networks
-
Gaithersburg, MD
-
Bartoli A, Hernández-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D. Secure lossless aggregation for smart grid M2M networks, In Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, 2010; 333-338.
-
(2010)
Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 333-338
-
-
Bartoli, A.1
Hernández-Serrano, J.2
Soriano, M.3
Dohler, M.4
Kountouris, A.5
Barthel, D.6
-
36
-
-
84874801689
-
On the measurement of privacy as an attacker's estimation error
-
[4 September 2013]
-
Rebollo-Monedero D, Parra-Arnau J, Diaz C, Forné J. On the measurement of privacy as an attacker's estimation error. International Journal of Information Security 2013; 12(2): 129-149. Available from: http://dx.doi.org/10.1007/s10207-012-0182-5 [4 September 2013].
-
(2013)
International Journal of Information Security
, vol.12
, Issue.2
, pp. 129-149
-
-
Rebollo-Monedero, D.1
Parra-Arnau, J.2
Diaz, C.3
Forné, J.4
-
38
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Springer-Verlag: Berlin and Heidelberg
-
Serjantov A, Danezis G. Towards an information theoretic metric for anonymity. In Proc. Workshop Priv. Enhanc. Technol. (PET), Vol. 2482. Springer-Verlag: Berlin and Heidelberg, 2002; 41-53.
-
(2002)
Proc. Workshop Priv. Enhanc. Technol. (PET)
, vol.2482
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
39
-
-
77956995886
-
From t -closeness-like privacy to postrandomization via information theory
-
[4 September 2013]
-
Rebollo-Monedero D, Forné J, Domingo-Ferrer J. From t -closeness-like privacy to postrandomization via information theory. IEEE Transactions on Knowledge and Data Engineering 2010; 22(11): 1623-1636. Available from: http://doi.ieeecomputersociety.org/10.1109/TKDE.2009.190 [4 September 2013].
-
(2010)
IEEE Transactions on Knowledge and Data Engineering
, vol.22
, Issue.11
, pp. 1623-1636
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
40
-
-
84892981403
-
Measuring the privacy of user profiles in personalized information systems
-
[4 September 2013], In press
-
Parra-Arnau J, Rebollo-Monedero D, Forné J. Measuring the privacy of user profiles in personalized information systems. Future Gen. Comput. Syst. 2013. Available from: http://dx.doi.org/10.1016/j.future.2013.01.001 [4 September 2013], In press.
-
(2013)
Future Gen. Comput. Syst.
-
-
Parra-Arnau, J.1
Rebollo-Monedero, D.2
Forné, J.3
|