-
1
-
-
84898006994
-
Smart grid-The new and improved power grid: A survey
-
4th Quart
-
X. Fang, S. Misra, G. Xue, and D. Yang, “Smart grid-The new and improved power grid: A survey,” IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 944-980, 4th Quart., 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.4
, pp. 944-980
-
-
Fang, X.1
Misra, S.2
Xue, G.3
Yang, D.4
-
2
-
-
84864865604
-
Securing smart grid: Cyber attacks, countermeasures, and challenges
-
Aug
-
X. Li et al., “Securing smart grid: Cyber attacks, countermeasures, and challenges,” IEEE Commun. Mag., vol. 58, no. 8, pp. 38-45, Aug. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.58
, Issue.8
, pp. 38-45
-
-
Li, X.1
-
3
-
-
78650887542
-
Private memoirs of a smart meter
-
Zürich, Switzerland
-
A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, “Private memoirs of a smart meter,” in Proc. BuildSys, Zürich, Switzerland, 2010, pp. 61-66.
-
(2010)
Proc. BuildSys
, pp. 61-66
-
-
Molina-Markham, A.1
Shenoy, P.2
Fu, K.3
Cecchet, E.4
Irwin, D.5
-
7
-
-
77249132957
-
-
Government of Ontario IT Standard: document 51, Govern. Ontario, Toronto, ON, Canada
-
Government of Ontario IT Standard: Advanced Metering Infrastructure, document 51, Govern. Ontario, Toronto, ON, Canada, 2007.
-
(2007)
Advanced Metering Infrastructure
-
-
-
8
-
-
84864583229
-
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Sep
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, Sep. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
9
-
-
84863427288
-
A practical smart metering system supporting privacy preserving billing and load monitoring
-
Singapore
-
H.-Y. Lin, W.-G. Tzeng, S.-T. Shen, and B.-S. P. Lin, “A practical smart metering system supporting privacy preserving billing and load monitoring,” in Proc. ACNS, Singapore, 2012, pp. 544-560.
-
(2012)
Proc. ACNS
, pp. 544-560
-
-
Lin, H.-Y.1
Tzeng, W.-G.2
Shen, S.-T.3
Lin, B.-S.P.4
-
10
-
-
84877580836
-
Privacy-preserving smart metering with multiple data consumers
-
C. Rottondi, G. Verticale, and A. Capone, “Privacy-preserving smart metering with multiple data consumers,” Comput. Netw., vol. 57, no. 7, pp. 1699-1713, 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.7
, pp. 1699-1713
-
-
Rottondi, C.1
Verticale, G.2
Capone, A.3
-
11
-
-
84877932292
-
Privacy-friendly tasking and trading of energy in smart grids
-
Coimbra, Portugal
-
T. Dimitriou and G. Karame, “Privacy-friendly tasking and trading of energy in smart grids,” in Proc. ACM SAC, Coimbra, Portugal, 2013, pp. 652-659.
-
(2013)
Proc. ACM SAC
, pp. 652-659
-
-
Dimitriou, T.1
Karame, G.2
-
12
-
-
84921020529
-
Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids
-
C. Rottondi, M. Savi, G. Verticale, and C. Krauß, “Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids,” Security Commun. Netw., vol. 8, no. 3, pp. 343-359, 2014.
-
(2014)
Security Commun. Netw.
, vol.8
, Issue.3
, pp. 343-359
-
-
Rottondi, C.1
Savi, M.2
Verticale, G.3
Krauß, C.4
-
13
-
-
84959444946
-
Chameleon signatures
-
H. Krawczyk and T. Rabin, “Chameleon signatures,” in Proc. NDSS, 2000, pp. 143-154.
-
(2000)
Proc. NDSS
, pp. 143-154
-
-
Krawczyk, H.1
Rabin, T.2
-
14
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” in Proc. NDSS, 2005, pp. 29-43.
-
(2005)
Proc. NDSS
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
15
-
-
58349118819
-
Compact proofs of retrievability
-
H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. Asiacrypt, 2008, pp. 90-107.
-
(2008)
Proc. Asiacrypt
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
16
-
-
84891063786
-
Privacy-enhanced data aggregation scheme against internal attackers in smart grid
-
Feb
-
C.-I. Fan, S.-Y. Huang, and Y.-L. Lai, “Privacy-enhanced data aggregation scheme against internal attackers in smart grid,” IEEE Trans. Ind. Informat., vol. 10, no. 1, pp. 666-675, Feb. 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.1
, pp. 666-675
-
-
Fan, C.-I.1
Huang, S.-Y.2
Lai, Y.-L.3
-
17
-
-
84903204895
-
Privacy-preserving smart metering with verifiability for both billing and energy management
-
Kyoto, Japan
-
K. Ohara, Y. Sakai, F. Yoshida, M. Iwamoto, and K. Ohta, “Privacy-preserving smart metering with verifiability for both billing and energy management,” in Proc. AsiaPKC, Kyoto, Japan, 2014, pp. 23-32.
-
(2014)
Proc. AsiaPKC
, pp. 23-32
-
-
Ohara, K.1
Sakai, Y.2
Yoshida, F.3
Iwamoto, M.4
Ohta, K.5
-
18
-
-
84942550998
-
Public-key cryptosystems based on composite degree resid-uosity classes
-
Prague, Czech Republic
-
P. Paillier, “Public-key cryptosystems based on composite degree resid-uosity classes,” in Proc. EUROCRYPT, Prague, Czech Republic, 1999, pp. 223-238.
-
(1999)
Proc. EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
19
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Cambridge, MA, USA
-
D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-DNF formulas on ciphertexts,” in Proc. TCC, Cambridge, MA, USA, 2005, pp. 325-341.
-
(2005)
Proc. TCC
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
20
-
-
84946840347
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” in Proc. Asiacrypt, 2001, pp. 514-532.
-
(2001)
Proc. Asiacrypt
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
21
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Jul
-
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
22
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
Waterloo, ON, Canada
-
K. Kursawe, G. Danezis, and M. Kohlweiss, “Privacy-friendly aggregation for the smart-grid,” in Proc. PETS, Waterloo, ON, Canada, 2011, 175-191.
-
(2011)
Proc. PETS
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
23
-
-
84902299754
-
Human-factor-aware privacy-preserving aggregation in smart grid
-
Jun
-
W. Jia, H. Zhu, Z. Cao, X. Dong, and C. Xiao, “Human-factor-aware privacy-preserving aggregation in smart grid,” IEEE Syst. J., vol. 8, no. 2, pp. 598-607, Jun. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.2
, pp. 598-607
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Xiao, C.5
-
24
-
-
84929190573
-
Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach
-
Jun
-
J. Won, C. Y. T. Ma, D. K. Y. Yau, and N. S. V. Rao, “Privacy-assured aggregation protocol for smart metering: A proactive fault-tolerant approach,” IEEE/ACM Trans. Netw., vol. 24, no. 3, pp. 1661-1674, Jun. 2016.
-
(2016)
IEEE/ACM Trans. Netw.
, vol.24
, Issue.3
, pp. 1661-1674
-
-
Won, J.1
Ma, C.Y.T.2
Yau, D.K.Y.3
Rao, N.S.V.4
-
25
-
-
85029554588
-
Differentially private smart metering with fault tolerance and range-based filtering
-
Sep
-
J. Ni et al., “Differentially private smart metering with fault tolerance and range-based filtering,” IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2483-2493, Sep. 2017.
-
(2017)
IEEE Trans. Smart Grid
, vol.8
, Issue.5
, pp. 2483-2493
-
-
Ni, J.1
-
26
-
-
85013408054
-
Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise
-
Mar
-
Z. Zhang, Z. Qin, L. Zhu, J. Weng, and K. Ren, “Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise,” IEEE Trans. Smart Grid, vol. 8, no. 2, pp. 619-626, Mar. 2017.
-
(2017)
IEEE Trans. Smart Grid
, vol.8
, Issue.2
, pp. 619-626
-
-
Zhang, Z.1
Qin, Z.2
Zhu, L.3
Weng, J.4
Ren, K.5
-
27
-
-
84964886903
-
Security-enhanced data aggregation against malicious gateways in smart grid
-
San Diego, CA, USA
-
J. Ni, K. Alharbi, X. Lin, and X. Shen, “Security-enhanced data aggregation against malicious gateways in smart grid,” in Proc. Globecom, San Diego, CA, USA, 2015, pp. 1-6.
-
(2015)
Proc. Globecom
, pp. 1-6
-
-
Ni, J.1
Alharbi, K.2
Lin, X.3
Shen, X.4
-
28
-
-
84937717111
-
Efficient and privacy-preserving metering protocols for smart grid systems
-
May
-
H. J. Jo, I. S. Kim, and D. H. Lee, “Efficient and privacy-preserving metering protocols for smart grid systems,” IEEE Trans. Smart Grid, vol. 7, no. 3, pp. 1732-1742, May 2016.
-
(2016)
IEEE Trans. Smart Grid
, vol.7
, Issue.3
, pp. 1732-1742
-
-
Jo, H.J.1
Kim, I.S.2
Lee, D.H.3
-
29
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Chicago, IL, USA
-
Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” in Proc. ACM CCS, Chicago, IL, USA, 2009, pp. 21-32.
-
(2009)
Proc. ACM CCS
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
30
-
-
84984631748
-
Energy big data analytics and security: Challenges and opportunities
-
Sep
-
J. Hu and A. V. Vasilakos, “Energy big data analytics and security: Challenges and opportunities,” IEEE Trans. Smart Grid, vol. 7, no. 5, pp. 2423-2436, Sep. 2016.
-
(2016)
IEEE Trans. Smart Grid
, vol.7
, Issue.5
, pp. 2423-2436
-
-
Hu, J.1
Vasilakos, A.V.2
-
31
-
-
85021308023
-
A review of false data injection attacks against modern power systems
-
Jul
-
G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A review of false data injection attacks against modern power systems,” IEEE Trans. Smart Grid, vol. 8, no. 4, pp. 1630-1638, Jul. 2017.
-
(2017)
IEEE Trans. Smart Grid
, vol.8
, Issue.4
, pp. 1630-1638
-
-
Liang, G.1
Zhao, J.2
Luo, F.3
Weller, S.R.4
Dong, Z.Y.5
-
32
-
-
33847645050
-
Placement of PMUs to enable bad data detection in state estimation
-
Nov
-
J. Chen and A. Abur, “Placement of PMUs to enable bad data detection in state estimation,” IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1608-1615, Nov. 2006.
-
(2006)
IEEE Trans. Power Syst.
, vol.21
, Issue.4
, pp. 1608-1615
-
-
Chen, J.1
Abur, A.2
-
33
-
-
84894537318
-
On false data-injection attacks against power system state estimation: Modeling and countermeasures
-
Mar
-
Q. Yang et al., “On false data-injection attacks against power system state estimation: Modeling and countermeasures,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.3
, pp. 717-729
-
-
Yang, Q.1
-
34
-
-
85018423393
-
Online detection of stealthy false data injection attacks in power system state estimation
-
to be published
-
A. Ashok, M. Govindarasu, and V. Ajjarapu, “Online detection of stealthy false data injection attacks in power system state estimation,” IEEE Trans. Smart Grid, to be published.
-
IEEE Trans. Smart Grid
-
-
Ashok, A.1
Govindarasu, M.2
Ajjarapu, V.3
-
35
-
-
85029494690
-
Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism
-
Sep
-
Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism,” IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2505-2516, Sep. 2017.
-
(2017)
IEEE Trans. Smart Grid
, vol.8
, Issue.5
, pp. 2505-2516
-
-
He, Y.1
Mendis, G.J.2
Wei, J.3
-
36
-
-
84994828087
-
Key-homomorphic signatures and applications to multiparty signatures and non-interactive zero-knowledge
-
Online.
-
D. Derler and D. Slamanig, “Key-homomorphic signatures and applications to multiparty signatures and non-interactive zero-knowledge,” Cryptol. ePrint Arch., Tech. Rep. 792, 2016. [Online]. Available: https://eprint.iacr.org/2016/792.pdf
-
(2016)
Cryptol. ePrint Arch., Tech. Rep.
, vol.792
-
-
Derler, D.1
Slamanig, D.2
-
37
-
-
0005506834
-
Kangaroos, monopoly and discrete logarithms
-
J. M. Pollard, “Kangaroos, monopoly and discrete logarithms,” J. Cryptol., vol. 13, no. 4, pp. 437-447, 2000.
-
(2000)
J. Cryptol.
, vol.13
, Issue.4
, pp. 437-447
-
-
Pollard, J.M.1
-
38
-
-
72549118033
-
Improved signcryption from q−Diffie-Hellman problem
-
Amalfi, Italy
-
B. Libert and J.-J. Quisquater, “Improved signcryption from q−Diffie-Hellman problem,” in Proc. SCN, Amalfi, Italy, 2004, pp. 220-234.
-
(2004)
Proc. SCN
, pp. 220-234
-
-
Libert, B.1
Quisquater, J.-J.2
-
39
-
-
84961293075
-
Conference key agreement from secret sharing
-
Wollongong, NSW, Australia
-
C.-H. Li and J. Pieprzyk, “Conference key agreement from secret sharing,” in Proc. ACISP, Wollongong, NSW, Australia, 1999, pp. 64-76.
-
(1999)
Proc. ACISP
, pp. 64-76
-
-
Li, C.-H.1
Pieprzyk, J.2
|