-
1
-
-
84908438451
-
-
Online]. Available: accessed on Feb
-
The GNU MP Bignum Library [Online]. Available: http://gmplib.org/, accessed on Feb. 9, 2014
-
(2014)
The GNU MP Bignum Library
, vol.9
-
-
-
2
-
-
84908438450
-
-
Online]. Available: accessed on Feb. 9 2014
-
- 2011). Control Your House Lights (and more) with Your iPhone [Online]. Available: http://cybernetnews.com/control-lights-with-youriphone/, accessed on Feb. 9, 2014
-
(2011)
Control Your House Lights (And More) with Your IPhone
-
-
-
3
-
-
84908438449
-
-
Online]. Available: accessed on Feb. 9 2014
-
- 2004). Control Your Appliances Over The Internet [Online]. Available: http://www.popularmechanics.com/technology/gadgets/1279916, accessed on Feb. 9, 2014
-
(2004)
Control Your Appliances over the Internet
-
-
-
4
-
-
84874430693
-
Towards accurate electricity load forecasting in smart grids
-
Z. Aung, M. Toukhy, J. Williams, A. Sanchez, and S. Herrero, "Towards accurate electricity load forecasting in smart grids," in Proc. IARIADBKDA12, 2012, pp. 51-57
-
(2012)
Proc. IARIADBKDA12
, pp. 51-57
-
-
Aung, Z.1
Toukhy, M.2
Williams, J.3
Sanchez, A.4
Herrero, S.5
-
5
-
-
23044435243
-
Efficient implementations for pairingbased cryptography
-
P. Barreto, B. Lynn, and M. Scott, "Efficient implementations for pairingbased cryptography," J. Cryptol., vol. 17, pp. 321-334, 2004
-
(2004)
J. Cryptol
, vol.17
, pp. 321-334
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
6
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE S&P07, 2007, pp. 321-334
-
(2007)
Proc. IEEE S&P07
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
7
-
-
79959853254
-
Relations among privacy notions acm
-
J.-M. Bohli and A. Pashalidis, "Relations among privacy notions," ACM Trans. Inf. Syst. Secur., vol. 14, no. 4, pp. 362-380, 2011
-
(2011)
Trans. Inf. Syst. Secur
, vol.14
, Issue.4
, pp. 362-380
-
-
Bohli, J.-M.1
Pashalidis, A.2
-
8
-
-
84874324906
-
Identity-based encryption from Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from Weil pairing," in Proc. Crypto01, 2001, vol. 2139, pp. 213-229
-
(2001)
Proc. Crypto01
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
78149274300
-
AERO: Extraction of users activities from electric power consumption data
-
Aug
-
H. S. Cho, T. Yamazaki, and M. Hahn, "AERO: Extraction of users activities from electric power consumption data," IEEE Trans. Consum. Electron., vol. 56, no. 3, pp. 2011-2018, Aug. 2010
-
(2010)
IEEE Trans. Consum. Electron
, vol.56
, Issue.3
, pp. 2011-2018
-
-
Cho, H.S.1
Yamazaki, T.2
Hahn, M.3
-
10
-
-
80051646795
-
Smart grid privacy via anonymization of smart metering data
-
C. Efthymiou and G. Kalogridis, "Smart grid privacy via anonymization of smart metering data," in Proc. IEEE SmartGridComm10, 2010, pp. 238-243
-
(2010)
Proc. IEEE SmartGridComm
, vol.10
, pp. 238-243
-
-
Efthymiou, C.1
Kalogridis, G.2
-
11
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in Proc. STM10, 2010, vol. 6710, pp. 226-238
-
(2010)
Proc. STM0
, vol.6710
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
12
-
-
84894755237
-
Secure data retrieval for decentralized disruptiontolerant military networks
-
Feb
-
J. Hur and K. Kang, "Secure data retrieval for decentralized disruptiontolerant military networks," IEEE/ACM Trans. Netw., vol. 22, no. 1, pp. 16-26, Feb. 2014
-
(2014)
IEEE/ ACM Trans. Netw
, vol.22
, Issue.1
, pp. 16-26
-
-
Hur, J.1
Kang, K.2
-
13
-
-
84883668982
-
Toward content-centric privacy in ICN: Attribute-based encryption and routing
-
Hong Kong
-
M. Ion, J. Zhang, and E. M. Schooler, "Toward content-centric privacy in ICN: Attribute-based encryption and routing," in Proc. 3rd ACM SIGCOMM Workshop Inf.-Centric Netw. (ICN13), Hong Kong, 2013, pp. 39-40
-
(2013)
Proc. 3rd ACM SIGCOMM Workshop Inf.-Centric Netw. (ICN13
, pp. 39-40
-
-
Ion, M.1
Zhang, J.2
Schooler, E.M.3
-
14
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
G. Kalogridis, C. Efthymiou, S. Z. Denic, T. A. Lewis, and R. Cepeda, "Privacy for smart meters: Towards undetectable appliance load signatures," in Proc. IEEE SmartGridComm10, 2010, pp. 232-237
-
(2010)
Proc. IEEE SmartGridComm
, vol.10
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.Z.3
Lewis, T.A.4
Cepeda, R.5
-
15
-
-
82155173473
-
ElecPrivacy: Evaluating the privacy protection of electricity management algorithms
-
Dec
-
G. Kalogridis, R. Cepeda, T. Lewis, S. Denic, and C. Efthymiou, "ElecPrivacy: Evaluating the privacy protection of electricity management algorithms," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 750-758, Dec. 2011
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 750-758
-
-
Kalogridis, G.1
Cepeda, R.2
Lewis, T.3
Denic, S.4
Efthymiou, C.5
-
16
-
-
84893061815
-
Maintaining privacy in data rich demand response applications
-
Berlin, Germany: Springer-Verlag
-
M. Karwe and J. Strüker, "Maintaining privacy in data rich demand response applications," in Smart Grid Security, vol. 7823. Berlin, Germany: Springer-Verlag, 2013, pp. 85-95
-
(2013)
Smart Grid Security
, vol.7823
, pp. 85-95
-
-
Karwe, M.1
Strüker, J.2
-
17
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Proc. PETS11, 2011, vol. 6794, pp. 175-191
-
(2011)
Proc. PETS
, vol.11
, Issue.6794
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
18
-
-
79957993008
-
Decentralizing attribute-based encryption
-
A. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Proc. EUROCRYPT11, 2011, vol. 6632, pp. 568-588
-
(2011)
Proc. EUROCRYPT11
, vol.6632
, pp. 568-588
-
-
Lewko, A.1
Waters, B.2
-
19
-
-
84894101649
-
Privacy preservation scheme for multicast communications in smart buildings of the smart grid
-
D. Li, Z. Aung, S. Sampalli, J.Williams, and A. Sanchez, "Privacy preservation scheme for multicast communications in smart buildings of the smart grid," Smart Grid Renew. Energy, vol. 4, pp. 313-324, 2013
-
(2013)
Smart Grid Renew. Energy
, vol.4
, pp. 313-324
-
-
Li, D.1
Aung, Z.2
Sampalli, S.3
Williams, J.4
Sanchez, A.5
-
20
-
-
84860848445
-
Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis
-
D. Li, Z. Aung, J. Williams, and A. Sanchez, "Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis," in Proc. IEEE PES Innov. Smart Grid Technol. (ISGT2), 2012, pp. 1-8
-
(2012)
Proc. IEEE PES Innov. Smart Grid Technol. (ISGT12
, pp. 1-8
-
-
Li, D.1
Aung, Z.2
Williams, J.3
Sanchez, A.4
-
21
-
-
84876028271
-
P3: Privacy preservation protocol for appliance control application
-
D. Li, Z. Aung, J. Williams, and A. Sanchez, "P3: Privacy preservation protocol for appliance control application," in Proc. IEEE SmartGridComm12, 2012, pp. 294-299
-
(2012)
Proc. IEEE SmartGridComm
, vol.12
, pp. 294-299
-
-
Li, D.1
Aung, Z.2
Williams, J.3
Sanchez, A.4
-
22
-
-
56749137665
-
A hybrid group key management protocol for reliable and authenticated rekeying
-
D. Li and S. Sampalli, "A hybrid group key management protocol for reliable and authenticated rekeying," Int. J. Netw. Secur., vol. 6, pp. 270-281, 2008
-
(2008)
Int. J. Netw. Secur
, vol.6
, pp. 270-281
-
-
Li, D.1
Sampalli, S.2
-
23
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
F. Li, B. Luo, and P. Liu, "Secure information aggregation for smart grids using homomorphic encryption," in Proc. IEEE SmartGridComm10, 2010, pp. 327-332
-
(2010)
Proc. IEEE SmartGridComm10
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
24
-
-
79955950768
-
Compressed meter reading for delay-sensitive and secure load report in smart grid
-
H. Li, R. Mao, L. Lai, and R. C. Qiu, "Compressed meter reading for delay-sensitive and secure load report in smart grid," in Proc. IEEE SmartGridComm10, 2010, pp. 114-119
-
(2010)
Proc. IEEE SmartGridComm0
, pp. 114-119
-
-
Li, H.1
Mao, R.2
Lai, L.3
Qiu, R.C.4
-
25
-
-
82155192847
-
Multicast authentication in the smart grid with onetime signature
-
Dec
-
Q. Li and G. Cao, "Multicast authentication in the smart grid with onetime signature," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 686-696, Dec. 2011
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 686-696
-
-
Li, Q.1
Cao, G.2
-
26
-
-
84942438500
-
Batch rekeying for secure group communication
-
Hong Kong, May
-
X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, "Batch rekeying for secure group communication," in Proc. 10th World Wide Web Conf. (WWW10), Hong Kong, May 2010, pp. 525-534
-
(2010)
Proc. 10th World Wide Web Conf. (WWW10
, pp. 525-534
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
27
-
-
77249154055
-
Inferring personal information from demand-response systems
-
Jan./Feb
-
M. A. Lisovich, D. K. Mulligan, and S. B. Wicker, "Inferring personal information from demand-response systems," IEEE Secur. Privacy, vol. 8, no. 1, pp. 11-20, Jan./Feb. 2010
-
(2010)
IEEE Secur. Privacy
, vol.8
, Issue.1
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
28
-
-
79959950900
-
Privacy concerns in upcoming residential and commercial demand-response systems
-
M. A. Lisovich and S. B.Wicker, "Privacy concerns in upcoming residential and commercial demand-response systems," in Proc. Clemson PS08, 2008, pp. 1-8
-
(2008)
Proc. Clemson PS08
, pp. 1-8
-
-
Lisovich, M.A.1
Wicker, S.B.2
-
29
-
-
77955309418
-
-
Online]. Available: accessed on Apr. 13 2013
-
B. Lynn. (2006). The Stanford Pairing Based Crypto Library [Online]. Available: http://crypto.stanford.edu/pbc/, accessed on Apr. 13, 2013
-
(2006)
The Stanford Pairing Based Crypto Library
-
-
Lynn, B.1
-
30
-
-
80755168372
-
Protecting consumer privacy from electric load monitoring
-
S. McLaughlin, P. McDaniel, and W. Aiello, "Protecting consumer privacy from electric load monitoring," in Proc. ACM CCS11, 2011, pp. 87-98
-
(2011)
Proc. ACM CCS
, vol.11
, pp. 87-98
-
-
McLaughlin, S.1
McDaniel, P.2
Aiello, W.3
-
31
-
-
78751557822
-
Multi-vendor penetration testing in the advanced metering infrastructure
-
S. McLaughlin, D. Podkuiko, S. Miadzvezhanka, A. Delozier, and P. McDaniel, "Multi-vendor penetration testing in the advanced metering infrastructure," in Proc. 26th Annu. Comput. Secur. Appl. Conf., 2010, pp. 107-116
-
(2010)
Proc. 26th Annu. Comput. Secur. Appl. Conf
, pp. 107-116
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
33
-
-
77952887452
-
Security technology for smart grid networks
-
Jun
-
A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, Jun. 2010
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
34
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. ACM CCS07, 2007, pp. 195-203
-
(2007)
Proc. ACM CCS07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
35
-
-
84855849799
-
Smart meter privacy: A utility-privacy framework
-
S. R. Rajagopalan, L. Sankar, S. Mohajer, and H. V. Poor, "Smart meter privacy: A utility-privacy framework," in Proc. IEEE SmartGridComm11, 2011, pp. 190-195
-
(2011)
Proc. IEEE SmartGridComm
, vol.11
, pp. 190-195
-
-
Rajagopalan, S.R.1
Sankar, L.2
Mohajer, S.3
Poor, H.V.4
-
36
-
-
80955143493
-
Privacy-preserving smart metering
-
A. Rial and G. Danezis, "Privacy-preserving smart metering," in Proc. ACM WPES11, 2011, pp. 49-60
-
(2011)
Proc. ACM WPES
, vol.11
, pp. 49-60
-
-
Rial, A.1
Danezis, G.2
-
37
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun
-
Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
38
-
-
84906994292
-
Performance evaluation of attribute-based encryption: Toward data privacy in the IoT
-
Sydney, N.S.W., Australia
-
X.Wang, J. Zhang, E. M. Schooler, and M. Ion, "Performance evaluation of attribute-based encryption: Toward data privacy in the IoT," in Proc. IEEE ICC14, Sydney, N.S.W., Australia, 2014, pp. 1-6
-
(2014)
Proc. IEEE ICC4
, pp. 1-6
-
-
Wang, X.1
Zhang, J.2
Schooler, E.M.3
Ion, M.4
-
39
-
-
0034780938
-
Reliable group rekeying: A performance analysis
-
Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: A performance analysis," ACM SIGCOMM Comput. Commun. Rev., vol. 31, no. 4, pp. 27-38, 2001
-
(2001)
ACM SIGCOMM Comput. Commun. Rev
, vol.31
, Issue.4
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
-
40
-
-
82155198906
-
Application-aware secure multicast for power grid communication
-
J. Zhang and C. A. Gunter, "Application-aware secure multicast for power grid communication," in Proc. IEEE SmartGridComm10, 2010, pp. 339-344
-
(2010)
Proc. IEEE SmartGridComm
, vol.10
, pp. 339-344
-
-
Zhang, J.1
Gunter, C.A.2
|