Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks
暂无分享,去创建一个
[1] Hung-Min Sun,et al. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[2] Steven B. Leeb,et al. Power signature analysis , 2003 .
[3] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[4] Yun Liu,et al. High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks , 2013, Int. J. Commun. Syst..
[5] Yacine Challal,et al. Efficient data aggregation with in-network integrity control for WSN , 2012, J. Parallel Distributed Comput..
[6] Devesh C. Jinwala,et al. Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure , 2017, Wirel. Pers. Commun..
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Hung-Min Sun,et al. SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN , 2013, J. Inf. Hiding Multim. Signal Process..
[9] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[10] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[11] Sencun Zhu,et al. SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks , 2008 .
[12] Devesh C. Jinwala,et al. Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[13] Nadeem Javaid,et al. A review of wireless communications for smart grid , 2015 .
[14] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[15] Tatsuya Yamazaki,et al. AERO: extraction of user's activities from electric power consumption data , 2010, IEEE Transactions on Consumer Electronics.
[16] Chun-I Fan,et al. Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid , 2014, IEEE Transactions on Industrial Informatics.
[17] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[18] Armand M. Makowski,et al. Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links , 2013, IEEE Transactions on Information Theory.
[19] H. T. Mouftah,et al. Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues , 2015, IEEE Communications Surveys & Tutorials.
[20] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[21] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[22] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[23] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[24] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[25] Kevin J. Henry,et al. Resilient Aggregation in Simple Linear Sensor Networks , 2014, IACR Cryptol. ePrint Arch..
[26] Gene Tsudik,et al. QUEST Software and , 2022 .
[27] H. Y. Lam,et al. A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.
[28] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[29] Sushmita Ruj,et al. A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids , 2013, IEEE Transactions on Smart Grid.
[30] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[31] Roberto Di Pietro,et al. Confidentiality and integrity for data aggregation in WSN using peer monitoring , 2009, Secur. Commun. Networks.
[32] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[33] J. Ferrer. A new privacy homomorphism and applications , 1996 .
[34] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.