-
1
-
-
84861608803
-
Towards optimal energy store-carry-and-deliver for Phevs via V2G system
-
H. Liang, B. Choi, W. Zhuang, and X. Shen, "Towards Optimal Energy Store-Carry-and-Deliver for Phevs via V2G System, " in Proc. IEEE INFOCOM, 2012, pp. 1674-1682.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1674-1682
-
-
Liang, H.1
Choi, B.2
Zhuang, W.3
Shen, X.4
-
2
-
-
84863508720
-
Decentralized economic dispatch in microgrids via heterogeneous wireless networks
-
July
-
H. Liang, B. Choi, A. Abdrabou, W. Zhuang, and X. Shen, "Decentralized Economic Dispatch in Microgrids via Heterogeneous Wireless Networks, " IEEE J. Sel. Areas Commun., vol. 30, no. 6, pp. 1061-1074, July 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.6
, pp. 1061-1074
-
-
Liang, H.1
Choi, B.2
Abdrabou, A.3
Zhuang, W.4
Shen, X.5
-
3
-
-
77952888003
-
Demand response as a market resource under the smart grid paradigm
-
June
-
F. Rahimi and A. Ipakchi, "Demand Response as a Market Resource under the Smart Grid Paradigm, " IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 82-88, June 2010.
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 82-88
-
-
Rahimi, F.1
Ipakchi, A.2
-
4
-
-
84864865604
-
Securing smart grid: Cyber attacks countermeasures and challenges
-
Aug.
-
X. Li, X. Liang, R. Lu, H. Zhu, X. Lin, and X. Shen, "Securing Smart Grid: Cyber Attacks, Countermeasures and Challenges, " IEEE Commun. Mag., vol. 50, no. 8, pp. 38-45, Aug. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.8
, pp. 38-45
-
-
Li, X.1
Liang, X.2
Lu, R.3
Zhu, H.4
Lin, X.5
Shen, X.6
-
5
-
-
84874965873
-
UDP: Usage-based dynamic pricing with privacy preservation for smart grid
-
Mar.
-
X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "UDP: Usage-Based Dynamic Pricing with Privacy Preservation for Smart Grid, " IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 141-150, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 141-150
-
-
Liang, X.1
Li, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
6
-
-
84877683384
-
EDR: An efficient demand response scheme for achieving forward secrecy in smart grid
-
Dec.
-
H. Li, X. Liang, R. Lu, X. Lin, and X. Shen, "EDR: An Efficient Demand Response Scheme for Achieving Forward Secrecy in Smart Grid, " in Proc. IEEE GLOBECOM, Dec. 2012, pp. 929-934.
-
(2012)
Proc. IEEE GLOBECOM
, pp. 929-934
-
-
Li, H.1
Liang, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
7
-
-
84902287084
-
An efficient merkle tree based authentication scheme for smart grid
-
DOI: 10.1109/JSYST.2013.2271537
-
H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, "An Efficient Merkle Tree Based Authentication Scheme for Smart Grid, " IEEE Syst. J., DOI: 10.1109/JSYST.2013.2271537.
-
IEEE Syst. J.
-
-
Li, H.1
Lu, R.2
Zhou, L.3
Yang, B.4
Shen, X.5
-
8
-
-
84865498118
-
Secure key distribution for the smart grid
-
Sept.
-
J. Xia and Y. Wang, "Secure Key Distribution for the Smart Grid, " IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1437-1443, Sept. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.3
, pp. 1437-1443
-
-
Xia, J.1
Wang, Y.2
-
9
-
-
7544247453
-
A forward-secure public-key encryption scheme
-
R. Canetti, S. Halevi, and J. Katz, "A Forward-Secure Public-Key Encryption Scheme, " in Proc. Adv. Eurocrypt, 2003, pp. 646-646.
-
(2003)
Proc. Adv. Eurocrypt
, pp. 646-646
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
10
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
F. Li, B. Luo, and P. Liu, "Secure Information Aggregation for Smart Grids using Homomorphic Encryption, " in Proc. IEEE Int. Conf. Smart Grid Comm, 2010, pp. 327-332.
-
(2010)
Proc. IEEE Int. Conf. Smart Grid Comm
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
11
-
-
84864583229
-
EPPA: An efficient and privacy preserving aggregation scheme for secure smart grid communications
-
Sept.
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA: An Efficient and Privacy Preserving Aggregation Scheme for Secure Smart Grid Communications, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, Sept. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
12
-
-
82155185209
-
A lightweight message authentication scheme for smart grid communications
-
Dec.
-
M. Fouda, Z. Fadlullah, N. Kato, R. Lu, and X. Shen, "A Lightweight Message Authentication Scheme for Smart Grid Communications, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675-685, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 675-685
-
-
Fouda, M.1
Fadlullah, Z.2
Kato, N.3
Lu, R.4
Shen, X.5
-
13
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, " in Proc. EUROCRYPT, 1999, pp. 223-238.
-
(1999)
Proc. EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
77953308558
-
Prisense: Privacy-preserving data aggregation in people-centric Urban Sensing Systems
-
J. Shi, R. Zhang, Y. Liu, and Y. Zhang, "Prisense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems, " in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Shi, J.1
Zhang, R.2
Liu, Y.3
Zhang, Y.4
-
15
-
-
77952053188
-
MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks
-
June
-
X. Lin, R. Lu, and X. Shen, "MDPA: Multidimensional Privacy-Preserving Aggregation Scheme for Wireless Sensor Networks, " Wireless Commun. Mobile Comput., vol. 10, no. 6, pp. 843-856, June 2010.
-
(2010)
Wireless Commun. Mobile Comput.
, vol.10
, Issue.6
, pp. 843-856
-
-
Lin, X.1
Lu, R.2
Shen, X.3
-
16
-
-
80052012333
-
Secure and efficient capability-based power management in the smart grid
-
D. Seo, H. Lee, and A. Perrig, "Secure and Efficient Capability-Based Power Management in the Smart Grid, " in Proc. IEEE ISPAW, 2011, pp. 119-126.
-
(2011)
Proc. IEEE ISPAW
, pp. 119-126
-
-
Seo, D.1
Lee, H.2
Perrig, A.3
-
17
-
-
78651394431
-
Pairing-based onion routing with improved forward secrecy
-
Dec.
-
A. Kate, G. Zaverucha, and I. Goldberg, "Pairing-Based Onion Routing with Improved Forward Secrecy, " ACMTrans. Inf. Syst. Security, vol. 13, no. 4, p. 29, Dec. 2010.
-
(2010)
ACM Trans. Inf. Syst. Security
, vol.13
, Issue.4
, pp. 29
-
-
Kate, A.1
Zaverucha, G.2
Goldberg, I.3
-
18
-
-
84904697012
-
Providing perfect forward secrecy for location-aware wireless sensor networks
-
Aug.
-
C. Chen, S. Huang, and I. Lin, "Providing Perfect Forward Secrecy for Location-Aware Wireless Sensor Networks, "EURASIP J. Wireless Commun. Netw., vol. 2012, no. 1, p. 241, Aug. 2012.
-
(2012)
EURASIP J. Wireless Commun. Netw.
, vol.2012
, Issue.1
, pp. 241
-
-
Chen, C.1
Huang, S.2
Lin, I.3
-
19
-
-
77955692643
-
Key infection secrecy transfer key evolution for sensor networks
-
Aug.
-
Z. Liu, J. Ma, Q. Pei, L. Pang, and Y. Park, "Key Infection, Secrecy Transfer, Key Evolution for Sensor Networks, " IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2643-2653, Aug. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.8
, pp. 2643-2653
-
-
Liu, Z.1
Ma, J.2
Pei, Q.3
Pang, L.4
Park, Y.5
-
20
-
-
78651396152
-
Key evolution systems in untrusted update environments
-
Dec.
-
B. Libert, J. Quisquater, andM. Yung, "Key Evolution Systems in Untrusted Update Environments, " ACMTrans. Inf. Syst. Security, vol. 13, no. 4, p. 37, Dec. 2010.
-
(2010)
ACM Trans. Inf. Syst. Security
, vol.13
, Issue.4
, pp. 37
-
-
Libert, B.1
Quisquater, J.2
Yung, M.3
-
21
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing, " in Proc. CRYPTO, 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes In Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
24
-
-
84881242587
-
Compression and information leakage of plaintext
-
New York, NY, USA: Springer-Verlag
-
J. Kelsey, "Compression and Information Leakage of Plaintext, " in Fast Software Encryption 2002. New York, NY, USA: Springer-Verlag, 2002, pp. 95-102.
-
(2002)
Fast Software Encryption
, pp. 95-102
-
-
Kelsey, J.1
-
25
-
-
84893563623
-
Handbook of the poisson distribution
-
May
-
S. Katti and A. Rao, "Handbook of the Poisson Distribution, " Technometrics, vol. 10, no. 2, p. 412, May 1968.
-
(1968)
Technometrics
, vol.10
, Issue.2
, pp. 412
-
-
Katti, S.1
Rao, A.2
-
26
-
-
77950251656
-
-
[Online]. Available
-
W. Dai, "Crypto++ 5.6.0 Benchmarks, (2009). [Online]. Available: http://www.cryptopp.com/benchmarks.html
-
(2009)
Crypto++ 5.6.0 Benchmarks
-
-
Dai, W.1
-
27
-
-
84886774908
-
-
[Online]. Available
-
"Miracl Crypto." [Online]. Available: https://certivox.com/ solutions/miracl-crypto-sdk/
-
Miracl Crypto
-
-
-
28
-
-
38149054118
-
-
[Online]. Available
-
B. Lynn, "PBC Library. [Online]. Available: http://crypto. stanford.edu/pbc/
-
PBC Library
-
-
Lynn, B.1
-
29
-
-
34547358080
-
Pairings
-
Cambridge, U.K.: Cambridge Univ. Press
-
I. Blake, G. Seroussi, and N. Smart, "Pairings, " in Advances in Elliptic Curve Cryptography. Cambridge, U.K.: Cambridge Univ. Press, 2005, pp. 183-213.
-
(2005)
Advances in Elliptic Curve Cryptography
, pp. 183-213
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
|