-
1
-
-
0015376113
-
Computation of channel capacity and rate-distortion functions
-
Blahut, R. E. (1972). "Computation of channel capacity and rate-distortion functions." IEEE Trans. Inform. Theor., 18(4), 460-473.
-
(1972)
IEEE Trans. Inform. Theor.
, vol.18
, Issue.4
, pp. 460-473
-
-
Blahut, R.E.1
-
2
-
-
84923179444
-
-
California Public Utilities Commission Jul. 28, 2011
-
California Public Utilities Commission (PUC). (2011). "Decision 11-07-056." California Public Utilities Commission 〈http://www.cpuc.ca.gov/NR/rdonlyres/56281147-02B8-42FC-A768-1448ED18373C/0/SCESmartGridAnnualPrivacyReport2013.pdf〉 (Jul. 28, 2011).
-
(2011)
Decision 11-07-056
-
-
-
4
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
IEEE Computer Society, Washington, DC
-
Danezis, G., Dingledine, R., and Mathewson, N. (2003). "Mixminion: Design of a type III anonymous remailer protocol." Proc., 2003 Symp. on Security and Privacy, IEEE Computer Society, Washington, DC, 2-15.
-
(2003)
Proc., 2003 Symp. on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
5
-
-
33746335051
-
Differential privacy
-
Automata, Languages and Programming Springer, Berlin
-
Dwork, C. (2006). "Differential privacy." Automata, languages and programming, lecture notes in computer science, Vol. 4052, Springer, Berlin, 1-12.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
6
-
-
80051646795
-
Smart grid privacy via anonymization of smart metering data
-
IEEE Communications Society
-
Efthymiou, C., and Kalogridis, G. (2010). "Smart grid privacy via anonymization of smart metering data." Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, 238-243.
-
(2010)
Proc., IEEE 1st Int. Conf. on Smart Grid Communications
, pp. 238-243
-
-
Efthymiou, C.1
Kalogridis, G.2
-
7
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
IEEE Communications Society
-
Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., and Cepeda, R. (2010). "Privacy for smart meters: Towards undetectable appliance load signatures." Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, 232-237.
-
(2010)
Proc., IEEE 1st Int. Conf. on Smart Grid Communications
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.Z.3
Lewis, T.A.4
Cepeda, R.5
-
8
-
-
80155178384
-
Control mechanisms for residential electricity demand in smart grids
-
IEEE Communications Society, Gaithersburg, MD
-
Kishore, S., and Snyder, L. V. (2010). " Control mechanisms for residential electricity demand in smart grids." Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, Gaithersburg, MD, 443-448.
-
(2010)
Proc., IEEE 1st Int. Conf. on Smart Grid Communications
, pp. 443-448
-
-
Kishore, S.1
Snyder, L.V.2
-
9
-
-
80051631772
-
Secure information aggregation for smart grids using homomorphic encryption
-
IEEE Communications Society
-
Li, F., Luo, B., and Liu, P. (2010). "Secure information aggregation for smart grids using homomorphic encryption." Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, 327-332.
-
(2010)
Proc., IEEE 1st Int. Conf. on Smart Grid Communications
, pp. 327-332
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
10
-
-
80755168372
-
Protecting consumer privacy from electric load monitoring
-
ACM Special Interest Group on Security, Audit and Control (SIGSAC)
-
McLaughlin, S., McDaniel, P., and Aiello, W. (2011). "Protecting consumer privacy from electric load monitoring." Proc., 18th Association for Computing Machinery Conf. on Computer and Communication Security, ACM Special Interest Group on Security, Audit and Control (SIGSAC).
-
(2011)
Proc., 18th Association for Computing Machinery Conf. on Computer and Communication Security
-
-
McLaughlin, S.1
McDaniel, P.2
Aiello, W.3
-
11
-
-
78650887542
-
Private memoirs of a smart meter
-
ACM
-
Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., and Irwin, D. (2010). "Private memoirs of a smart meter." Proc., 2nd ACM Workshop Embedded Sensing Systems for Energy-Efficiency in Buildings, ACM, 61-66.
-
(2010)
Proc., 2nd ACM Workshop Embedded Sensing Systems for Energy-Efficiency in Buildings
, pp. 61-66
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
12
-
-
84855849799
-
Smart meter privacy: A utility-privacy tradeoff framework
-
IEEE Communications Society
-
Rajagopalan, R., Sankar, L., Mohajer, S., and Poor, H. V. (2011). "Smart meter privacy: A utility-privacy tradeoff framework." Proc., IEEE 2nd Int. Conf. on Smart Grid Communications, IEEE Communications Society.
-
(2011)
Proc., IEEE 2nd Int. Conf. On Smart Grid Communications
-
-
Rajagopalan, R.1
Sankar, L.2
Mohajer, S.3
Poor, H.V.4
-
13
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
SCITEPRESS Digital Library
-
Rastogi, V., and Nath, S. (2010). "Differentially private aggregation of distributed time-series with transformation and encryption." Proc., 2010 Int. Conf. Data Management, SCITEPRESS Digital Library, 735-746.
-
(2010)
Proc., 2010 Int. Conf. Data Management
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
14
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
Designing Privacy Enhancing Technologies: Proc., Int. Workshop on Design Issues in Anonymity and Unobservability H. Federrath, ed. Springer, Berlin
-
Raymond, J.-F. (2001). "Traffic analysis: Protocols, attacks, design issues and open problems." Designing Privacy Enhancing Technologies: Proc., Int. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, H. Federrath, ed., Vol. 2009, Springer, Berlin, 10-29.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
15
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M. G., Syverson, P. F., and Goldschlag, D. M. (1998). "Anonymous connections and onion routing." IEEE J. Sel. Areas Commun., 16(4), 482-494.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
16
-
-
19744377978
-
Passive-attack analysis for connection-based anonymity systems
-
Serjantov, A., and Sewell, P. (2005). "Passive-attack analysis for connection-based anonymity systems." Int. J. Inform. Secur., 4(3), 5262-5270.
-
(2005)
Int. J. Inform. Secur.
, vol.4
, Issue.3
, pp. 5262-5270
-
-
Serjantov, A.1
Sewell, P.2
-
17
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C. E. (1949). "Communication theory of secrecy systems." Bell Syst. Tech. J., 28(4), 656-714.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-714
-
-
Shannon, C.E.1
-
18
-
-
0026237284
-
Using appliance signatures for monitoring residential loads at meter panel level
-
Sultanem, F. (1991). "Using appliance signatures for monitoring residential loads at meter panel level." IEEE Trans. Power Delivery, 6(4), 1380-1385.
-
(1991)
IEEE Trans. Power Delivery
, vol.6
, Issue.4
, pp. 1380-1385
-
-
Sultanem, F.1
-
19
-
-
70349151031
-
-
DOE Office of Electricity Delivery and Energy Reliability Jun. 19
-
U.S. Department of Energy (DOE). (2009). "The smart grids: An introduction." DOE Office of Electricity Delivery and Energy Reliability 〈http://energy.gov/oe/downloads/smart-grid-introduction-0〉 (Jun. 19, 2013).
-
(2009)
The Smart Grids: An Introduction
-
-
U.S. Department of Energy (DOE)1
-
21
-
-
80051653423
-
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
-
IEEE Signal Processing Society
-
Varodayan, D., and Khisti, A. (2011). "Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage." Proc., IEEE Int. Conf. on Acoustics, Speech and Signal Processing, IEEE Signal Processing Society.
-
(2011)
Proc., IEEE Int. Conf. on Acoustics, Speech and Signal Processing
-
-
Varodayan, D.1
Khisti, A.2
-
22
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
Voydock, V. L., and Kent, S. T. (1983). "Security mechanisms in high-level network protocols." ACM Comput. Surv., 15(2), 135-171.
-
(1983)
ACM Comput. Surv.
, vol.15
, Issue.2
, pp. 135-171
-
-
Voydock, V.L.1
Kent, S.T.2
|