-
1
-
-
77955696530
-
A reliability perspective of the smart grid
-
K. Moslehi and R. Kumar, "A reliability perspective of the smart grid", IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 57-64, 2010.
-
(2010)
IEEE Transactions on Smart Grid
, vol.1
, Issue.1
, pp. 57-64
-
-
Moslehi, K.1
Kumar, R.2
-
2
-
-
84898948155
-
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
-
to appear
-
H. Li, and X. Lin, and H. Yang, and X. Liang, and R. Lu, and X. Shen, "EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid", IEEE Transactions on Parallel and Distributed Systems, to appear.
-
IEEE Transactions on Parallel and Distributed Systems
-
-
Li, H.1
Lin, X.2
Yang, H.3
Liang, X.4
Lu, R.5
Shen, X.6
-
3
-
-
84898934872
-
SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing
-
Published online
-
M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, "SESA: An Efficient Searchable Encryption Scheme for Auction in Emerging Smart Grid Marketing", Security and Communication Networks, 2013, Published online.
-
(2013)
Security and Communication Networks
-
-
Wen, M.1
Lu, R.2
Lei, J.3
Li, H.4
Liang, X.5
Shen, X.6
-
4
-
-
80053502277
-
Cognitive radio based hierarchical communications infrastructure for smart grid
-
R. Yu, Y. Zhang, S. Gjessing, C. Yuen, S. Xie, and M. Guizani, "Cognitive radio based hierarchical communications infrastructure for smart grid", IEEE Network, vol. 25, no. 5, pp. 6-14, 2011.
-
(2011)
IEEE Network
, vol.25
, Issue.5
, pp. 6-14
-
-
Yu, R.1
Zhang, Y.2
Gjessing, S.3
Yuen, C.4
Xie, S.5
Guizani, M.6
-
5
-
-
84874965873
-
UDP: Usage-based dynamic pricing with privacy preservation for smart grid
-
X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "UDP: Usage-based dynamic pricing with privacy preservation for smart grid", IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 141-150, 2013.
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.1
, pp. 141-150
-
-
Liang, X.1
Li, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
6
-
-
84864583229
-
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications", IEEE Trans. on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621-1632, 2012.
-
(2012)
IEEE Trans. on Parallel and Distributed Systems
, vol.23
, Issue.9
, pp. 1621-1632
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
7
-
-
84899023203
-
An efficient merkle tree based authentication scheme for smart grid
-
to appear
-
H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, "An efficient merkle tree based authentication scheme for smart grid", IEEE Systems Journal, to appear.
-
IEEE Systems Journal
-
-
Li, H.1
Lu, R.2
Zhou, L.3
Yang, B.4
Shen, X.5
-
8
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, G. Persiano, "Public Key Encryption with Keyword Search". in proceeding of EUROCRYPT 2004, LNCS 3027, pp. 506-522.
-
Proceeding of EUROCRYPT 2004, LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
9
-
-
84904089610
-
PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid
-
to appear
-
M. Wen, andR. Lu, and K. Zhang, and J. Lei, and X. Liang, and X. Shen, "PaRQ: A Privacy-preserving Range Query Scheme over Encrypted Metering Data for Smart Grid", IEEE Transactions on Emerging Topics in Computing, to appear.
-
IEEE Transactions on Emerging Topics in Computing
-
-
Wen, M.1
Lu, R.2
Zhang, K.3
Lei, J.4
Liang, X.5
Shen, X.6
-
10
-
-
78649325305
-
An efficient public key encryption with conjunctive-subset keywords search
-
B. Zhang, F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search", Journal of Network and Computer Applications, vol. 34, no. 1, pp. 262-267, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 262-267
-
-
Zhang, B.1
Zhang, F.2
-
11
-
-
33750246968
-
On the integration of public key data encryption and public key encryption with keyword search
-
J. Baek, R. Safavi-Naini, W. Susilo, "On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search", in Proceeding of ISC 2006. LNCS 4176, pp. 217-232.
-
Proceeding of ISC 2006. LNCS
, vol.4176
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
12
-
-
70749116607
-
An efficient privacy preserving keyword search scheme in cloud computing
-
Q. Liu, G. Wang, and J. W, "An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing", in Proceeding of ICCSE'09, 2009, pp. 715-720
-
(2009)
Proceeding of ICCSE'09
, pp. 715-720
-
-
Liu, Q.1
Wang J W, G.2
-
13
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data", The VLDB Journal, vol. 21, no. 3, pp. 333-358, 2012.
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
14
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing", in Proceeding of CRYPTO 2001, LNCS 2139, pp. 213-229.
-
Proceeding of CRYPTO 2001, LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
16
-
-
77950864045
-
Proxy re-encryption with keyword search
-
J. Shao, Z. Cao, X. Liang, H. Lin, "Proxy re-encryption with keyword search". Information Sciences, vol. 180, no. 13, pp. 2576-2587, 2010.
-
(2010)
Information Sciences
, vol.180
, Issue.13
, pp. 2576-2587
-
-
Shao, J.1
Cao, Z.2
Liang, X.3
Lin, H.4
-
18
-
-
34547358080
-
Pairings
-
Chapter 9, Cambridge University Press: NY, USA
-
SD. Galbraith, "Pairings", Advances in Elliptic Curve Cryptography, Chapter 9, Cambridge University Press: NY, USA; 2005; pp. 183-213.
-
(2005)
Advances in Elliptic Curve Cryptography
, pp. 183-213
-
-
Galbraith, S.D.1
|