-
1
-
-
78650887542
-
Private memoirs of a smart meter
-
ACM
-
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, "Private memoirs of a smart meter," in Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building. ACM, 2010, pp. 61-66.
-
(2010)
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-efficiency in Building
, pp. 61-66
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
2
-
-
82155173473
-
Elecprivacy: Evaluating the privacy protection of electricity management algorithms
-
G. Kalogridis, R. Cepeda, S. Denic, T. Lewis, and C. Efthymiou, "Elecprivacy: Evaluating the privacy protection of electricity management algorithms," IEEE Trans. on Smart Grid, vol. 2, no. 4, pp. 750-758.
-
IEEE Trans. on Smart Grid
, vol.2
, Issue.4
, pp. 750-758
-
-
Kalogridis, G.1
Cepeda, R.2
Denic, S.3
Lewis, T.4
Efthymiou, C.5
-
3
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in Proc. STM'11, 2011, pp. 226-238.
-
(2011)
Proc. Stm'11
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
4
-
-
84862109345
-
A security framework for smart metering with multiple data consumers
-
march
-
C. Rottondi, G. Verticale, and A. Capone, "A security framework for smart metering with multiple data consumers," in INFOCOM Workshops, march 2012, pp. 103-108.
-
(2012)
Infocom Workshops
, pp. 103-108
-
-
Rottondi, C.1
Verticale, G.2
Capone, A.3
-
7
-
-
84855643907
-
Smart metering depseudonymization
-
M. Jawurek, M. Johns, and K. Rieck, "Smart metering depseudonymization," in ACSAC, 2011, pp. 227-236.
-
(2011)
Acsac
, pp. 227-236
-
-
Jawurek, M.1
Johns, M.2
Rieck, K.3
-
8
-
-
78149274300
-
Aero: Extraction of user's activities from electric power consumption data
-
H. S. Cho, T. Yamazaki, and M. Hahn, "Aero: Extraction of user's activities from electric power consumption data," IEEE Transactions on Consumer Electronics, vol. 56, no. 3, pp. 2011-2018, 2010.
-
(2010)
IEEE Transactions on Consumer Electronics
, vol.56
, Issue.3
, pp. 2011-2018
-
-
Cho, H.S.1
Yamazaki, T.2
Hahn, M.3
-
9
-
-
77249154055
-
Inferring personal information from demand-response systems
-
M. A. Lisovich, D. K. Mulligan, and S. B. Wicker, "Inferring personal information from demand-response systems," Security & Privacy, IEEE, vol. 8, no. 1, pp. 11-20, 2010.
-
(2010)
Security & Privacy, IEEE
, vol.8
, Issue.1
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
10
-
-
84859094259
-
Disaggregation of home energy display data using probabilistic approach
-
M. Zeifman, "Disaggregation of home energy display data using probabilistic approach," IEEE Trans. on Consumer Electronics, vol. 58, no. 1, pp. 23-31, 2012.
-
(2012)
IEEE Trans. on Consumer Electronics
, vol.58
, Issue.1
, pp. 23-31
-
-
Zeifman, M.1
-
11
-
-
84855849799
-
Smart meter privacy: A utility-privacy framework
-
S. R. Rajagopalan, L. Sankar, S. Mohajer, and H. V. Poor, "Smart meter privacy: A utility-privacy framework," in IEEE SmartGridComm, 2011, pp. 190-195.
-
(2011)
IEEE Smartgridcomm
, pp. 190-195
-
-
Rajagopalan, S.R.1
Sankar, L.2
Mohajer, S.3
Poor, H.V.4
-
12
-
-
79953198933
-
Nonintrusive appliance load monitoring: Review and outlook
-
M. Zeifman and K. Roth, "Nonintrusive appliance load monitoring: Review and outlook," IEEE Transactions on Consumer Electronics, vol. 57, no. 1, pp. 76-84, 2011.
-
(2011)
IEEE Transactions on Consumer Electronics
, vol.57
, Issue.1
, pp. 76-84
-
-
Zeifman, M.1
Roth, K.2
-
13
-
-
84876028271
-
P3: Privacy preservation protocol for appliance control application
-
IEEE
-
D. Li, Z. Aung, J. Williams, and A. Sanchez, "P3: Privacy preservation protocol for appliance control application," in IEEE SmartGridComm. IEEE, 2012, pp. 294-299.
-
(2012)
IEEE SmartGridComm
, pp. 294-299
-
-
Li, D.1
Aung, Z.2
Williams, J.3
Sanchez, A.4
-
15
-
-
85081863649
-
Design and implementation of privacy preserving billing protocol for smart grid
-
C.-I. Fan, S.-Y. Huang, and W. Artan, "Design and implementation of privacy preserving billing protocol for smart grid," The Journal of Supercomputing, pp. 1-22, 2013.
-
(2013)
The Journal of Supercomputing
, pp. 1-22
-
-
Fan, C.-I.1
Huang, S.-Y.2
Artan, W.3
-
16
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. E. Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in CRYPTO, 1985, pp. 10-18.
-
(1985)
CRYPTO
, pp. 10-18
-
-
Gamal, T.E.1
-
17
-
-
84942550998
-
Public-key cryptosystem based on composite degree residuosity classes
-
Springer-Verlag
-
P. Paillier, "Public-key cryptosystem based on composite degree residuosity classes," in Proceedings of Eurocrypt '99. Springer-Verlag, 1999, pp. 223-238.
-
(1999)
Proceedings of Eurocrypt
, vol.99
, pp. 223-238
-
-
Paillier, P.1
-
18
-
-
24144433396
-
Evaluating 2-dnf formulas on ciphertexts
-
D. Boneh, E. Goh, and K. Nissim, "Evaluating 2-dnf formulas on ciphertexts," in Proc. of Theory of Cryptography, 2005, pp. 325-341.
-
(2005)
Proc. of Theory of Cryptography
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
19
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
New York, NY, USA: ACM
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in STOC. New York, NY, USA: ACM, 2009, pp. 169-178.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
20
-
-
77956993098
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in EUROCRYPT'10, 2010.
-
(2010)
EUROCRYPT'10
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
21
-
-
0020312165
-
Protocols for secure computations
-
Washington, DC, USA: IEEE Computer Society
-
A. C. Yao, "Protocols for secure computations," in IEEE SFCS. Washington, DC, USA: IEEE Computer Society, 1982, pp. 160-164.
-
(1982)
IEEE SFCS
, pp. 160-164
-
-
Yao, A.C.1
-
22
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof-systems," in STOC '85, 1985, pp. 291-304.
-
(1985)
STOC
, vol.85
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
23
-
-
84907427722
-
Patternpreserving k-Anonymization of sequences and its application to mobility data mining
-
R. G. Pensa, A. Monreale, F. Pinelli, and D. Pedreschi, "Patternpreserving k-Anonymization of sequences and its application to mobility data mining," Privacy in Location-Based Applications, 2008.
-
(2008)
Privacy in Location-based Applications
-
-
Pensa, R.G.1
Monreale, A.2
Pinelli, F.3
Pedreschi, D.4
-
24
-
-
78651325938
-
K, p-Anonymity: Towards pattern-preserving anonymity of time-series data
-
X. Shang, K. Chen, L. Shou, G. Chen, and T. Hu, "(k, p)-Anonymity: towards pattern-preserving anonymity of time-series data," in CIKM, 2010, pp. 1333-1336.
-
(2010)
CIKM
, pp. 1333-1336
-
-
Shang, X.1
Chen, K.2
Shou, L.3
Chen, G.4
Hu, T.5
-
27
-
-
54249097947
-
A practical universal circuit construction and secure evaluation of private functions
-
springer
-
V. Kolesnikov and T. Schneider, "A practical universal circuit construction and secure evaluation of private functions," in Financial Cryptography and Data Security. Springer, 2008, pp. 83-97.
-
(2008)
Financial Cryptography and Data Security
, pp. 83-97
-
-
Kolesnikov, V.1
Schneider, T.2
-
28
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright, "Selective private function evaluation with applications to private statistics," in PODC, vol. 1, 2001, pp. 293-304.
-
(2001)
PODC
, vol.1
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
29
-
-
68849099052
-
Practical secure evaluation of semi-private functions
-
Springer
-
A. Paus, A.-R. Sadeghi, and T. Schneider, "Practical secure evaluation of semi-private functions," in Applied Cryptography and Network Security. Springer, 2009, pp. 89-106.
-
(2009)
Applied Cryptography and Network Security
, pp. 89-106
-
-
Paus, A.1
Sadeghi, A.-R.2
Schneider, T.3
|