-
1
-
-
84921047157
-
-
Guidelines for smart grid cyber security, NIST Interagency Report 7628, National Institute of Standards and Technology, Information Technology Laboratory
-
National Institute of Standards and Technology (NIST). Guidelines for smart grid cyber security, NIST Interagency Report 7628, National Institute of Standards and Technology, Information Technology Laboratory, 2010. http://www.nist.gov.
-
(2010)
-
-
-
2
-
-
84921047156
-
-
Peer-to-peer networks applied to power grid
-
Beitollahi H, Deconinck G. Peer-to-peer networks applied to power grid, 2007.
-
(2007)
-
-
Beitollahi, H.1
Deconinck, G.2
-
4
-
-
84921028487
-
-
A low-cost alternative to smart metering infrastructure based on peer-to-peer technologies, 6th International Conference on the European Energy Market, 2009. EEM 2009, Leuven, Belgium
-
Rusitschka S, Gerdes C, Eger K. A low-cost alternative to smart metering infrastructure based on peer-to-peer technologies, 6th International Conference on the European Energy Market, 2009. EEM 2009, Leuven, Belgium, 2009;1-6.
-
(2009)
, pp. 1-6
-
-
Rusitschka, S.1
Gerdes, C.2
Eger, K.3
-
5
-
-
84885891473
-
-
Towards benchmarking of P2P technologies from a SCADA systems protection perspective, MOBILIGHT 2010: Inproceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems
-
Khelil A, Jeckel S, Germanus D, Suri N. Towards benchmarking of P2P technologies from a SCADA systems protection perspective, MOBILIGHT 2010: Inproceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems, 2010;400-414.
-
(2010)
, pp. 400-414
-
-
Khelil, A.1
Jeckel, S.2
Germanus, D.3
Suri, N.4
-
6
-
-
84880204032
-
Distributed privacy-preserving aggregation of metering data in smart grids
-
Rottondi C, Verticale G, Krauss C. Distributed privacy-preserving aggregation of metering data in smart grids. IEEE Journal on Selected Areas in Communications 2013; 31 (7): 1342-1354, DOI: 10.1109/JSAC.2013.130716.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.7
, pp. 1342-1354
-
-
Rottondi, C.1
Verticale, G.2
Krauss, C.3
-
7
-
-
0037298256
-
Chord: a scalable peer-to-peer lookup protocol for internet applications
-
Stoica I, Morris R, Liben-Nowell D, Karger D, Kaashoek M, Dabek F, Balakrishnan H. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking 2003; 11(1): 149-160.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.1
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.4
Kaashoek, M.5
Dabek, F.6
Balakrishnan, H.7
-
8
-
-
84921047154
-
-
SoK: Privacy technologies for smart grids - a survey of options
-
Jawurek M, Kerschbaum F, Danezis G. SoK: Privacy technologies for smart grids - a survey of options, 2012. http://www.research.microsoft.com/pubs/178055/paper.pdf.
-
(2012)
-
-
Jawurek, M.1
Kerschbaum, F.2
Danezis, G.3
-
9
-
-
84904608123
-
EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
-
Li H, Lin X, Yang H, Liang X, Lu R, Shen X. EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Transactions on Parallel and Distributed Systems 2013; PP (99): 1-1, DOI: 10.1109/TPDS.2013.124.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, Issue.99
, pp. 1-1
-
-
Li, H.1
Lin, X.2
Yang, H.3
Liang, X.4
Lu, R.5
Shen, X.6
-
11
-
-
84875055639
-
A decentralized security framework for data aggregation and access control in smart grids
-
Ruj S, Nayak A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Transactions on Smart Grid 2013; 4 (1): 196-205, DOI: 10.1109/TSG.2012.2224389.
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.1
, pp. 196-205
-
-
Ruj, S.1
Nayak, A.2
-
12
-
-
84877932292
-
Privacy-friendly tasking and trading of energy in smart grids
-
Coimbra, Portugal
-
Dimitriou T, Karame G. Privacy-friendly tasking and trading of energy in smart grids, Proceedings of ACM SAC 13, 28th Symposium on Applied Computing, Coimbra, Portugal, 2013; 652-659.
-
(2013)
Proceedings of ACM SAC 13, 28th Symposium on Applied Computing
, pp. 652-659
-
-
Dimitriou, T.1
Karame, G.2
-
13
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
Springer-Verlag: Berlin, Heidelberg
-
Kursawe K, Danezis G, Kohlweiss M. Privacy-friendly aggregation for the smart-grid. In Privacy Enhancing Technologies, Vol.6794. Springer-Verlag: Berlin, Heidelberg, 2011; 175-191.
-
(2011)
Privacy Enhancing Technologies
, vol.6794
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
14
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Cryptology, CRYPTO '91, Springer-Verlag: London, UK, UK [Accessed on January 2013].
-
Pedersen TP. Non-interactive and information-theoretic secure verifiable secret sharing, Proceedings of the 11th Annual International Cryptology Conference on Advances In Cryptology, CRYPTO '91, Springer-Verlag: London, UK, UK, 1992; 129-140. http://dl.acm.org/citation.cfm?id=646756.705507 [Accessed on January 2013].
-
(1992)
Proceedings of the 11th Annual International Cryptology Conference on Advances
, pp. 129-140
-
-
Pedersen, T.P.1
-
15
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic
-
CRYPTO '99, Springer-Verlag: London, UK, UK [Accessed on January 2013].
-
Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic, Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '99, Springer-Verlag: London, UK, UK, 1999; 148-164. http://dl.acm.org/citation.cfm?id=646764.703956 [Accessed on January 2013].
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
, pp. 148-164
-
-
Schoenmakers, B.1
-
16
-
-
84921047153
-
-
Differentially private billing with rebates [Accessed on January 2013].
-
Danezis G, Kohlweiss M, Rial A. Differentially private billing with rebates, 2011. http://www.research.microsoft.com/pubs/144654/main.pdf [Accessed on January 2013].
-
(2011)
-
-
Danezis, G.1
Kohlweiss, M.2
Rial, A.3
-
17
-
-
84874332569
-
Asynchronous computational vss with reduced communication complexity
-
Dawson Ed (ed), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg [Accessed on January 2013].
-
Backes M, Datta A, Kate A. Asynchronous computational vss with reduced communication complexity. In Topics in Cryptology - CT-RSA 2013, vol.7779, Dawson Ed (ed), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2013; 259-276. DOI: 10.1007/978-3-642-36095-4_17. http://dx.doi.org/10.1007/978-3-642-36095-4_17 [Accessed on January 2013].
-
(2013)
Topics in Cryptology - CT-RSA 2013
, vol.7779
, pp. 259-276
-
-
Backes, M.1
Datta, A.2
Kate, A.3
-
18
-
-
85024290278
-
Group signatures
-
EUROCRYPT'91, Springer-Verlag: Berlin, Heidelberg [Accessed on January 2013].
-
Chaum D, VanHeyst E. Group signatures, Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'91, Springer-Verlag: Berlin, Heidelberg, 1991; 257-265. http://dl.acm.org/citation.cfm?id=1754868.1754897 [Accessed on January 2013].
-
(1991)
Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques
, pp. 257-265
-
-
Chaum, D.1
VanHeyst, E.2
-
19
-
-
35048887476
-
Short group signatures
-
LNCS series. Springer-Verlag: Berlin, Heidelberg
-
Boneh D, Boyen X, Shacham H. Short group signatures. In Proceedings of CRYPTO 04, LNCS series. Springer-Verlag: Berlin, Heidelberg, 2004; 41-55.
-
(2004)
Proceedings of CRYPTO 04
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
20
-
-
14844309671
-
Group signatures with verifier-local revocation
-
CCS '04, ACM: New York, NY, USA [Accessed on January 2013].
-
Boneh D, Shacham H. Group signatures with verifier-local revocation, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04, ACM: New York, NY, USA, 2004; 168-177. http://doi.acm.org/10.1145/1030083.1030106 [Accessed on January 2013].
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
21
-
-
78650275037
-
Shorter verifier-local revocation group signature with backward unlinkability
-
Pairing'10, Springer-Verlag: Berlin, Heidelberg [Accessed on January 2013].
-
Wei L, Liu J. Shorter verifier-local revocation group signature with backward unlinkability, Proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing'10, Springer-Verlag: Berlin, Heidelberg, 2010;136-146. http://dl.acm.org/citation.cfm?id=1948966.1948979 [Accessed on January 2013].
-
(2010)
Proceedings of the 4th International Conference on Pairing-Based Cryptography
, pp. 136-146
-
-
Wei, L.1
Liu, J.2
-
22
-
-
0034775826
-
A scalable content-addressable network
-
[Accessed on January 2013] 2001-08
-
Ratnasamy S, Francis P, Handley M, Karp R, Shenker S. A scalable content-addressable network. SIGCOMM Computer Communication Review 2001-08; 31 (4): 161-172, http://doi.acm.org/10.1145/964723.383072 [Accessed on January 2013].
-
SIGCOMM Computer Communication Review
, vol.31
, Issue.4
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
23
-
-
0003858844
-
-
UCB/CSD-01-1141, EECS Department, University of California, Berkeley [Accessed on January 2013].
-
Zhao BY, Kubiatowicz JD, Joseph AD. Tapestry: an infrastructure for fault-tolerant wide-area location and routing. UCB/CSD-01-1141, EECS Department, University of California, Berkeley, 2001. http://www.eecs.berkeley.edu/Pubs/TechRpts/2001/5213.html [Accessed on January 2013].
-
(2001)
Tapestry: an infrastructure for fault-tolerant wide-area location and routing
-
-
Zhao, B.Y.1
Kubiatowicz, J.D.2
Joseph, A.D.3
-
24
-
-
57349142855
-
Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
Middleware '01, Springer-Verlag: London, UK, UK [Accessed on January 2013].
-
Rowstron AIT, Druschel P. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Middleware '01, Springer-Verlag: London, UK, UK, 2001; 329-350. http://dl.acm.org/citation.cfm?id=646591.697650 [Accessed on January 2013].
-
(2001)
Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
, pp. 329-350
-
-
Rowstron, A.I.T.1
Druschel, P.2
-
25
-
-
84947273682
-
The Sybil attack
-
Druschel P, Kaashoek F, Rowstron A (eds), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg
-
Douceur J. The Sybil attack. In Peer-to-Peer Systems, vol.2429, Druschel P, Kaashoek F, Rowstron A (eds), Lecture Notes in Computer Science. Springer-Verlag: Berlin, Heidelberg, 2002; 251-260.
-
(2002)
Peer-to-Peer Systems
, vol.2429
, pp. 251-260
-
-
Douceur, J.1
-
26
-
-
34547492967
-
Eclipse attacks on overlay networks: threats and defenses
-
Singh A, Ngan T, Druschel P, Wallach D. Eclipse attacks on overlay networks: threats and defenses, Proc IEEE INFOCOM, Barcelona, Spain, 2006; 1-12.
-
(2006)
Proc IEEE INFOCOM, Barcelona, Spain
, pp. 1-12
-
-
Singh, A.1
Ngan, T.2
Druschel, P.3
Wallach, D.4
-
27
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
[Accessed on January 2013]. 2002-12
-
Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS. Secure routing for structured peer-to-peer overlay networks. SIGOPS Operating Systems Review 2002-12; 36 (SI): 299-314, DOI: 10.1145/844128.844156. http://doi.acm.org/10.1145/844128.844156 [Accessed on January 2013].
-
SIGOPS Operating Systems Review
, vol.36
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
28
-
-
84862933063
-
Making eclipse attacks computationally infeasible in large-scale DHTS
-
Orlando, Florida, USA
-
Zhang R, Zhang J, Chen Y, Qin N, Liu B, Zhang Y. Making eclipse attacks computationally infeasible in large-scale DHTS, 2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC), Orlando, Florida, USA, 2011; 1-8. DOI: 10.1109/PCCC.2011.6108091.
-
(2011)
2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC)
, pp. 1-8
-
-
Zhang, R.1
Zhang, J.2
Chen, Y.3
Qin, N.4
Liu, B.5
Zhang, Y.6
-
30
-
-
84877580836
-
Privacy-preserving smart metering with multiple data consumers
-
[Accessed on January 2013].
-
Rottondi C, Verticale G, Capone A. Privacy-preserving smart metering with multiple data consumers. Computer Networks 2013; 57 (7): 1699-1713, http://www.sciencedirect.com/science/article/pii/S1389128613000364 [Accessed on January 2013].
-
(2013)
Computer Networks
, vol.57
, Issue.7
, pp. 1699-1713
-
-
Rottondi, C.1
Verticale, G.2
Capone, A.3
-
31
-
-
84923272193
-
-
An overview of the OMNeT++ simulation environment, Simutools '08: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems Workshops, Marseille, France
-
Varga A, Hornig R. An overview of the OMNeT++ simulation environment, Simutools '08: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems Workshops, Marseille, France, 2008; 1-10.
-
(2008)
, pp. 1-10
-
-
Varga, A.1
Hornig, R.2
-
32
-
-
84921047152
-
-
OverSim: the overlay simulation framework [Accessed on January 2013]
-
OverSim: the overlay simulation framework. http://www.oversim.org/ [Accessed on January 2013].
-
-
-
-
33
-
-
84983503429
-
Detection and mitigation of the eclipse attack in Chord overlays
-
June To appear in International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS-2014), Hasselt, Belgium
-
Rottondi C, Panzeri A, Yagne C, Verticale G. Detection and mitigation of the eclipse attack in Chord overlays, To appear in International Workshop on Secure Peer-to-Peer Intelligent Networks & Systems (SPINS-2014), Hasselt, Belgium, June 2014.
-
(2014)
-
-
Rottondi, C.1
Panzeri, A.2
Yagne, C.3
Verticale, G.4
|