-
1
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the council
-
Oct
-
"Directive 95/46/EC of the European Parliament and of the Council," Official Journal L, vol. 281, pp. 31-50, Oct. 1995.
-
(1995)
Official Journal L
, vol.281
, pp. 31-50
-
-
-
2
-
-
24944574585
-
Directive 2002/58/EC of the European Parliament and of the council
-
July
-
"Directive 2002/58/EC of the European Parliament and of the Council," Official Journal L, vol. 201, pp. 37-47, July 2002.
-
(2002)
Official Journal L
, vol.201
, pp. 37-47
-
-
-
3
-
-
85032769785
-
-
Sept
-
IEEE Signal Process. Mag., vol. 29, no. 5, Sept. 2012.
-
(2012)
IEEE Signal Process. Mag
, vol.29
, Issue.5
-
-
-
4
-
-
80053020495
-
I have a DREAM! (Differentially PrivatE smart Metering)
-
18-20 May
-
G. Ács and C. Castelluccia, "I have a DREAM! (Differentially PrivatE smart Metering)," in Proc. Information Hiding Conference, 18-20 May 2011, pp. 118-132.
-
(2011)
Proc. Information Hiding Conference
, pp. 118-132
-
-
Ács, G.1
Castelluccia, C.2
-
6
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
DOI 10.1109/MOBIQUITOUS.2005.25, 1540992, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient aggregation of encrypted data in wireless sensor networks," in Proc. Second Annu. Int. Conf. Mobile and Ubiquitous Systems: Networking and Services, Washington, DC, 2005, pp. 109-117. (Pubitemid 44523269)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
7
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, "Differential privacy," in Automata, Languages and Programming, (LNCS ) vol. 4052. Berlin: Springer, 2006, pp. 1-12. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4052
, pp. 1-12
-
-
Dwork, C.1
-
8
-
-
84863479013
-
Private computation of spatial and temporal power consumption with smart meters
-
Singapore, 26-29 June
-
Z. Erkin and G. Tsudik, "Private computation of spatial and temporal power consumption with smart meters," in Proc. Int. Conf. Applied Cryptography and Network Security, Singapore, 26-29 June 2012, pp. 561-577.
-
(2012)
Proc. Int. Conf. Applied Cryptography and Network Security
, pp. 561-577
-
-
Erkin, Z.1
Tsudik, G.2
-
9
-
-
84873903805
-
-
ETSI [Online]
-
ETSI. Open smart grid protocol (OSGP), 2012. [Online]. Available: http://www. etsi.org/deliver/etsi-gs/OSG/001-099/001/01.01.01-60/gs- osg001v010101p.pdf
-
(2012)
Open Smart Grid Protocol (OSGP)
-
-
-
10
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
Jan
-
C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists," EURASIP J. Inform. Secur., vol. 2007, pp. 1-15, Jan. 2007.
-
(2007)
EURASIP J. Inform. Secur
, vol.2007
, pp. 1-15
-
-
Fontaine, C.1
Galand, F.2
-
11
-
-
78650883756
-
Disaggregated end-use energy sensing for the smart grid
-
Jan.-Mar.
-
J. Froehlich, E. Larson, S. Gupta, G. Cohn, M. Reynolds, and S. Patel, "Disaggregated end-use energy sensing for the smart grid," IEEE Pervasive Comput., vol. 10, no. 1, pp. 28-39, Jan.-Mar. 2011.
-
(2011)
IEEE Pervasive Comput
, vol.10
, Issue.1
, pp. 28-39
-
-
Froehlich, J.1
Larson, E.2
Gupta, S.3
Cohn, G.4
Reynolds, M.5
Patel, S.6
-
12
-
-
80054080910
-
Privacy-friendly energy-metering via homomorphic encryption
-
Proc. 6th Workshop Security and Trust Management (STM 2010)
-
F. D. Garcia and B. Jacobs, "Privacy-friendly energy-metering via homomorphic encryption," in Proc. 6th Workshop Security and Trust Management (STM 2010), (LNCS), vol. 6710, pp. 226-238.
-
LNCS
, vol.6710
, pp. 226-238
-
-
Garcia, F.D.1
Jacobs, B.2
-
13
-
-
0022793132
-
How to construct random functions
-
Aug
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," J. ACM, vol. 33, no. 4, pp. 792-807, Aug. 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
0026970695
-
Nonintrusive appliance load monitoring
-
DOI 10.1109/5.192069
-
G. Hart, "Nonintrusive appliance load monitoring," Proc IEEE, vol. 80, no. 12, pp. 1870-1891, Dec. 1992. (Pubitemid 23612231)
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.12
, pp. 1870-1891
-
-
Hart George, W.1
-
15
-
-
79961183580
-
Plug-in privacy for smart metering billing
-
Waterloo, Canada
-
M. Jawurek, M. Johns, and F. Kerschbaum, "Plug-in privacy for smart metering billing," in Privacy Enhanced Technologies Symposium, Waterloo, Canada, 2011, pp. 192-210.
-
(2011)
Privacy Enhanced Technologies Symposium
, pp. 192-210
-
-
Jawurek, M.1
Johns, M.2
Kerschbaum, F.3
-
16
-
-
74549207745
-
Security analysis of dutch smart metering systems
-
July [Online]
-
S. Keemink and B. Roos, "Security analysis of dutch smart metering systems," Universitait van Amsterdam, Tech. Rep., July 2008. [Online]. Available: https://www.os3.nl/2007-2008/students/bart-roos/rp2
-
(2008)
Universitait Van Amsterdam, Tech. Rep
-
-
Keemink, S.1
Roos, B.2
-
17
-
-
80053014815
-
Differentially private billing with rebates
-
18-20 May Prague, Czech Republic
-
M. Kohlweiss and G. Danezis, "Differentially private billing with rebates," in Proc. Information Hiding Conf. (LNCS), 18-20 May 2011, Prague, Czech Republic, pp. 148-162.
-
(2011)
Proc. Information Hiding Conf. (LNCS)
, pp. 148-162
-
-
Kohlweiss, M.1
Danezis, G.2
-
18
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
Waterloo, Canada
-
K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Privacy Enhanced Technologies Symposium, Waterloo, Canada, 2011, pp. 175-191.
-
(2011)
Privacy Enhanced Technologies Symposium
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
19
-
-
85032751121
-
Encrypted signal processing for privacy protection
-
Jan.
-
R. Lagendijk, Z. Erkin, and M. Barni, "Encrypted signal processing for privacy protection," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 82-105, Jan. 2013.
-
(2013)
IEEE Signal Process. Mag
, vol.30
, Issue.1
, pp. 82-105
-
-
Lagendijk, R.1
Erkin, Z.2
Barni, M.3
-
20
-
-
84944878354
-
-
1st ed. Boca Raton, FL: CRC Press
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, 1st ed. Boca Raton, FL: CRC Press, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
21
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT'99, (LNCS), vol. 1592, pp. 223-238.
-
Advances in Cryptology-EUROCRYPT'99, (LNCS)
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
36348942851
-
On concealed data aggregation for WSNs
-
DOI 10.1109/CCNC.2007.45, 4199133, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
-
S. Peter, K. Piotrowski, and P. Langendoerfer, "On concealed data aggregation for wireless sensor networks," in Proc. 4th IEEE Consumer Communications and Networking Conf., Las Vegas, NV, 2007, pp. 192-196. (Pubitemid 350141421)
-
(2007)
2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
, pp. 192-196
-
-
Peter, S.1
Piotrowski, K.2
Langendoerfer, P.3
-
23
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
DOI 10.1145/1180345.1180366, Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, 2006, pp. 169-176. (Pubitemid 47168568)
-
(2006)
Proceedings of the Fourth ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
25
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|