-
1
-
-
84864602357
-
The progressive smart grid system from both power and communications aspects
-
Mar.
-
C. Lo and N. Ansari, "The progressive smart grid system from both power and communications aspects", IEEE Commun. Surv. Tuts., vol. 14, no. 3, pp. 799-821, Mar. 2012.
-
(2012)
IEEE Commun. Surv. Tuts.
, vol.14
, Issue.3
, pp. 799-821
-
-
Lo, C.1
Ansari, N.2
-
2
-
-
84864616517
-
Dependability analysis of control center networks in smart grid using stochastic petri nets
-
Sep.
-
R. Zeng, Y. Jiang, C. Lin, and X. Shen, "Dependability analysis of control center networks in smart grid using stochastic petri nets", IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1721-1730, Sep. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1721-1730
-
-
Zeng, R.1
Jiang, Y.2
Lin, C.3
Shen, X.4
-
3
-
-
84864583229
-
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Sep.
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications", IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, Sep. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
4
-
-
84864625995
-
Alleviating solar energy congestion in the distribution grid via smart metering communications
-
Sep.
-
C. Lo and N. Ansari, "Alleviating solar energy congestion in the distribution grid via smart metering communications", IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1607-1620, Sep. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1607-1620
-
-
Lo, C.1
Ansari, N.2
-
5
-
-
84875054650
-
Decentralized controls and communications for autonomous distribution networks in smart grid
-
Mar.
-
C. Lo and N. Ansari, "Decentralized controls and communications for autonomous distribution networks in smart grid", IEEE Trans. Parallel Distrib. Syst., vol. 4, no. 1, pp. 66-77, Mar. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.4
, Issue.1
, pp. 66-77
-
-
Lo, C.1
Ansari, N.2
-
7
-
-
84874965873
-
UDP: Usage-based dynamic pricing with privacy preservation for smart grid
-
Mar.
-
X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, "UDP: Usage-based dynamic pricing with privacy preservation for smart grid", IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 141-150, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 141-150
-
-
Liang, X.1
Li, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
8
-
-
80053502277
-
Cognitive radio based hierarchical communications infrastructure for smart grid
-
Sep./, Oct
-
R. Yu, Y. Zhang, S. Gjessing, C. Yuen, S. Xie, and M. Guizani, "Cognitive radio based hierarchical communications infrastructure for smart grid", IEEE Netw., vol. 25, no. 5, pp. 6-14, Sep./Oct. 2011.
-
(2011)
IEEE Netw.
, vol.25
, Issue.5
, pp. 6-14
-
-
Yu, R.1
Zhang, Y.2
Gjessing, S.3
Yuen, C.4
Xie, S.5
Guizani, M.6
-
9
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Mar.
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing", in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
10
-
-
36849063206
-
Security services in group communications over wireless infrastructure, mobile Ad Hoc, and wireless sensor networks
-
Oct.
-
P. Sakarindr and N. Ansari, "Security services in group communications over wireless infrastructure, mobile Ad Hoc, and wireless sensor networks", IEEE Wireless Commun., vol. 14, no. 5, pp. 8-20, Oct. 2007.
-
(2007)
IEEE Wireless Commun.
, vol.14
, Issue.5
, pp. 8-20
-
-
Sakarindr, P.1
Ansari, N.2
-
11
-
-
84864865604
-
Securing smart grid: Cyber attacks, countermeasures, and challenges
-
Aug.
-
X. Li, X. Liang, R. Lu, X. Shen, X. Lin, and H. Zhu, "Securing smart grid: Cyber attacks, countermeasures, and challenges", IEEE Commun. Mag., vol. 50, no. 8, pp. 38-45, Aug. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.8
, pp. 38-45
-
-
Li, X.1
Liang, X.2
Lu, R.3
Shen, X.4
Lin, X.5
Zhu, H.6
-
12
-
-
84899023203
-
An efficient Merkle tree based authentication scheme for smart grid
-
to be published
-
H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, "An efficient Merkle tree based authentication scheme for smart grid", IEEE Syst. J., to be published.
-
IEEE Syst. J.
-
-
Li, H.1
Lu, R.2
Zhou, L.3
Yang, B.4
Shen, X.5
-
13
-
-
80053020495
-
I have a DREAM! (DiffeRentially privatE smArt Metering)
-
G. Acs and C. Castelluccia, "I have a DREAM! (DiffeRentially privatE smArt Metering)", in Proc. 13th Int. Conf. Inf. Hiding, 2011, pp. 118-132.
-
(2011)
Proc. 13th Int. Conf. Inf. Hiding
, pp. 118-132
-
-
Acs, G.1
Castelluccia, C.2
-
14
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search", in Proc. Adv. Cryptol., 2004, pp. 506-522.
-
(2004)
Proc. Adv. Cryptol.
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
15
-
-
84961691740
-
SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing
-
to be published
-
M. Wen, R. Lu, J. Lei, H. Li, X. Liang, and X. Shen, "SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing", Security Commun. Netw., to be published.
-
Security Commun. Netw.
-
-
Wen, M.1
Lu, R.2
Lei, J.3
Li, H.4
Liang, X.5
Shen, X.6
-
16
-
-
80052002672
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
A. Boldyreva, N. Chenette, and A. O'Neill, "Order-preserving encryption revisited: Improved security analysis and alternative solutions", in Proc. Adv. Cryptol., 2011, pp. 578-595.
-
(2011)
Proc. Adv. Cryptol.
, pp. 578-595
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
17
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data", in Proc. ACM Int. Conf. Manag. Data SIGMOD, 2004, pp. 563-574.
-
(2004)
Proc. ACM Int. Conf. Manag. Data SIGMOD
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
18
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data", VLDB J., vol. 21, no. 3, pp. 333-358, 2012.
-
(2012)
VLDB J.
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
19
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data", in Proc. TCC, 2007, pp. 535-554.
-
(2007)
Proc. TCC
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
20
-
-
80051794695
-
Efficient hidden vector encryption for conjunctive queries on encrypted data
-
Oct.
-
J. Park, "Efficient hidden vector encryption for conjunctive queries on encrypted data", IEEE Trans. Knowl. Data Eng., vol. 23, no. 10, pp. 1483-1497, Oct. 2011.
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.10
, pp. 1483-1497
-
-
Park, J.1
-
21
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products", in Proc. Adv. Cryptol. EUROCRYPT, 2008, pp. 146-162.
-
(2008)
Proc. Adv. Cryptol. EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
34548774576
-
Multidimensional range query over encrypted data
-
May
-
E. Shi, J. Bethencourt, T. Chan, D. Song, and A. Perrig, "Multidimensional range query over encrypted data", in Proc. IEEE Symp. Security Privacy, May 2007, pp. 350-364.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.3
Song, D.4
Perrig, A.5
-
24
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing", in Proc. Adv. Cryptol, 2001, pp. 213-229.
-
(2001)
Proc. Adv. Cryptol
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
25
-
-
23944473052
-
The exact security of an identity based signature and its applications
-
B. Libert and J. Quisquater, "The exact security of an identity based signature and its applications", Lab. d'Inform. l'École Polytech., Palaiseau, France, Tech. Rep. F-91128, 2004.
-
(2004)
Lab. D'Inform. L'École Polytech., Palaiseau, France, Tech. Rep
-
-
Libert, B.1
Quisquater, J.2
-
26
-
-
0004181422
-
Rijndael
-
J. Daemen, V. Rijmen, and A. Proposal, "Rijndael", in Proc. 1st Adv. Encryption Standard Candidate Conf., NIST., 1998.
-
(1998)
Proc. 1st Adv. Encryption Standard Candidate Conf., NIST.
-
-
Daemen, J.1
Rijmen, V.2
Proposal, A.3
-
27
-
-
84961720959
-
-
Upper Saddle River, NJ, USA: Prentice-Hall
-
D. P. Bertsekas, R. G. Gallager, and P. Humblet, Data Networks, vol. 2. Upper Saddle River, NJ, USA: Prentice-Hall, 1992.
-
(1992)
Data Networks
, vol.2
-
-
Bertsekas, D.P.1
Gallager, R.G.2
Humblet, P.3
-
28
-
-
0020846845
-
A probabilistic look at networks of quasi-reversible queues
-
Nov.
-
J. Walrand, "A probabilistic look at networks of quasi-reversible queues", IEEE Trans. Inf. Theory, vol. IT-29, no. 6, pp. 825-831, Nov. 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.6
, pp. 825-831
-
-
Walrand, J.1
-
30
-
-
78649673610
-
Opportunities and challenges of wireless communication technologies for smart grid applications
-
Jul.
-
P. Parikh, M. Kanabar, and T. Sidhu, "Opportunities and challenges of wireless communication technologies for smart grid applications", in Proc. IEEE Power Energy Soc. Gen. Meeting, Jul. 2010, pp. 1-7.
-
(2010)
Proc. IEEE Power Energy Soc. Gen. Meeting
, pp. 1-7
-
-
Parikh, P.1
Kanabar, M.2
Sidhu, T.3
|