-
1
-
-
80052070344
-
Real-Time coordination of plug-in electric vehicle charging in smart grids to minimize power losses and improve voltage profile, " Smart Grid
-
Sept
-
S. Deilami, A.Masoum, P.Moses, and M.Masoum, "Real-Time coordination of plug-in electric vehicle charging in smart grids to minimize power losses and improve voltage profile, " Smart Grid, IEEE Transactions on, vol. 2, no. 3, pp. 456-467, Sept 2011.
-
(2011)
IEEE Transactions on
, vol.2
, Issue.3
, pp. 456-467
-
-
Deilami, S.1
Masoum, A.2
Moses, P.3
Masoum, M.4
-
3
-
-
84907529149
-
Real-Time distributed control for smart electric vehicle chargers: From a static to a dynamic study
-
Sept
-
O. Ardakanian, S. Keshav, and C. Rosenberg, "Real-Time distributed control for smart electric vehicle chargers: From a static to a dynamic study, " Smart Grid, IEEE Transactions on, vol. 5, no. 5, pp. 2295-2305, Sept 2014.
-
(2014)
Smart Grid IEEE Transactions on
, vol.5
, Issue.5
, pp. 2295-2305
-
-
Ardakanian, O.1
Keshav, S.2
Rosenberg, C.3
-
4
-
-
85027906877
-
Real-Time load elasticity tracking and pricing for electric vehicle charging
-
N. Soltani, S.-J. Kim, and G. Giannakis, "Real-Time load elasticity tracking and pricing for electric vehicle charging, " Smart Grid, IEEE Transactions on, vol. PP, no. 99, pp. 1-1, 2014.
-
(2014)
Smart Grid IEEE Transactions on
, vol.99
, pp. 1
-
-
Soltani, N.1
Kim, S.-J.2
Giannakis, G.3
-
6
-
-
84857641127
-
Optimal scheduling of vehicle-To-grid energy and ancillary services
-
March
-
E. Sortomme andM. El-Sharkawi, "Optimal scheduling of vehicle-To-grid energy and ancillary services, " Smart Grid, IEEE Transactions on, vol. 3, no. 1, pp. 351-359, March 2012.
-
(2012)
Smart Grid, IEEE Transactions on
, vol.3
, Issue.1
, pp. 351-359
-
-
Sortomme, E.1
El-Sharkawi, M.2
-
7
-
-
80053607874
-
Flooding-resilient broadcast authentication for VANETs
-
H.-C. Hsiao, A. Studer, C. Chen, A. Perrig, F. Bai, B. Bellur, and A. Iyer, "Flooding-resilient broadcast authentication for VANETs, " in ACM MobiCom, 2011.
-
(2011)
ACM MobiCom
-
-
Hsiao, H.-C.1
Studer, A.2
Chen, C.3
Perrig, A.4
Bai, F.5
Bellur, B.6
Iyer, A.7
-
11
-
-
84964955320
-
Providing efficient privacy-Aware incentives for mobile sensing
-
Q. Li and G. Cao, "Providing Efficient Privacy-Aware Incentives for Mobile Sensing, " in IEEE ICDCS 14.
-
IEEE ICDCS 14
-
-
Li, Q.1
Cao, G.2
-
12
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-Times anonymous authentication
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, "How to Win the Clonewars: Efficient Periodic N-Times Anonymous Authentication, " in ACM CCS 06.
-
ACM CCS 06
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
13
-
-
84937407719
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
ser. Lecture Notes in Computer Science, T. Okamoto, Ed, Springer Berlin Heidelberg, 2000
-
M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, " in Advances in Cryptology ASIACRYPT 2000, ser. Lecture Notes in Computer Science, T. Okamoto, Ed. Springer Berlin Heidelberg, 2000, vol. 1976, pp. 531-545.
-
Advances in Cryptology ASIACRYPT 2000
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
15
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. Van Oorschot, and M. Wiener, "Authentication and authenticated key exchanges, " Designs, Codes and Cryptography, vol. 2, no. 2, pp. 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
16
-
-
84889026398
-
Oake: A new family of implicitly authenticated diffie-hellman protocols
-
A. C.-C. Yao and Y. Zhao, "Oake: A new family of implicitly authenticated diffie-hellman protocols, " in ACM CCS 13.
-
ACM CCS 13
-
-
Yao, A.C.-C.1
Zhao, Y.2
-
17
-
-
79951749452
-
-
MobiSys 08
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, "Anonysense: Privacy-Aware people-centric sensing, " in MobiSys 08.
-
Anonysense: Privacy-Aware People-centric Sensing
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Triandopoulos, N.6
-
20
-
-
84888309373
-
Extended capabilities for a privacyenhanced participatory sensing infrastructure (pepsi), " Information Forensics and Security
-
Dec
-
E. De Cristofaro and C. Soriente, "Extended capabilities for a privacyenhanced participatory sensing infrastructure (pepsi), " Information Forensics and Security, IEEE Transactions on, vol. 8, no. 12, pp. 2021-2033, Dec 2013.
-
(2013)
IEEE Transactions on
, vol.8
, Issue.12
, pp. 2021-2033
-
-
De Cristofaro, E.1
Soriente, C.2
-
21
-
-
84907400964
-
Sppear: Security & privacy-preserving architecture for participatory-sensing applications
-
S. Gisdakis, T. Giannetsos, and P. Papadimitratos, "SPPEAR: Security & Privacy-preserving Architecture for Participatory-sensing Applications, " in ACM WiSec 14.
-
ACM WiSec 14
-
-
Gisdakis, S.1
Giannetsos, T.2
Papadimitratos, P.3
-
23
-
-
1942497489
-
-
M. Hallenbeck, M. Rice, B. Smith, C. Cornell-Martinez, and J.Wilkinson, "Vehicle volume distributions by classification, " 1997.
-
(1997)
Vehicle Volume Distributions by Classification
-
-
Hallenbeck, M.1
Rice, M.2
Smith, B.3
Cornell-Martinez, C.4
Wilkinson, J.5
-
25
-
-
0000845043
-
Non-interactive and information-Theoretic secure verifiable secret sharing
-
T. Pedersen, "Non-interactive and information-Theoretic secure verifiable secret sharing, " in CRYPTO 91.
-
CRYPTO 91
-
-
Pedersen, T.1
-
27
-
-
84956866842
-
-
Public Key Cryptography, ser. Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
S. Blake-Wilson and A. Menezes, "Unknown key-share attacks on the station-To-station (sts) protocol, " in Public Key Cryptography, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1999, vol. 1560, pp. 154-170.
-
(1999)
Unknown Key-share Attacks on the Station-To-station (Sts) Protocol
, vol.1560
, pp. 154-170
-
-
Blake-Wilson, S.1
Menezes, A.2
|