A Review of the Privacy-preserving Mechanisms of the Smart Meter in M2M
暂无分享,去创建一个
Wei Yuan | Liang Hu | Hongtu Li | Yuyu Sun | Jianfeng Chu | Ling Chi | Wei Yuan | Liang Hu | Hongtu Li | Jian-feng Chu | Ling Chi | Yuyu Sun
[1] F.M. Cleveland,et al. Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[2] Inhyok Cha,et al. Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.
[3] Bo Sheng,et al. Verifiable Privacy-Preserving Sensor Network Storage for Range Query , 2011, IEEE Transactions on Mobile Computing.
[4] Carl H. Hauser,et al. Smart Generation and Transmission With Coherent, Real-Time Data , 2011, Proceedings of the IEEE.
[5] Chris Clifton,et al. Multirelational k-Anonymity , 2009, IEEE Trans. Knowl. Data Eng..
[6] Antonello Monti,et al. Design of Smart MVDC Power Grid Protection , 2011, IEEE Transactions on Instrumentation and Measurement.
[7] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[8] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[9] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[10] Rongbo Zhu. Intelligent Collaborative Event Query Algorithm in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[11] Vinu V. Das,et al. Wireless Communication System for Energy Meter Reading , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[12] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[13] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] Paul J. Werbos,et al. Computational Intelligence for the Smart Grid-History, Challenges, and Opportunities , 2011, IEEE Computational Intelligence Magazine.
[15] Haibo He,et al. Special Issue on Computational Intelligence in Smart Grid [Guest Editorial] , 2011, IEEE Computational Intelligence Magazine.
[16] Stefan Fischer,et al. A Security Architecture for Mobile Wireless Sensor Networks , 2004, ESAS.
[17] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[18] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[19] Hua Wang,et al. A family of enhanced (L, alpha)-diversity models for privacy preserving data publishing , 2011, Future Gener. Comput. Syst..
[20] Francesco Bonchi,et al. Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..
[21] Rongbo Zhu,et al. Energy-Aware Distributed Intelligent Data Gathering Algorithm in Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.
[22] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[23] Yixian Yang,et al. An Efficient Algorithm for Time-Driven Data Gathering in Wireless Sensor Networks Using Inter-Session Network Coding , 2012 .
[24] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[25] D.G. Hart,et al. Using AMI to realize the Smart Grid , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[26] Lin Sun,et al. A Temporal and Spatial Data Compression Algorithm Based on Confidence Interval for Wireless Sensor Networks , 2012 .
[27] Bin Hu,et al. Multigate Communication Network for Smart Grid , 2011, Proceedings of the IEEE.
[28] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[29] Thilo Sauter,et al. End-to-End Communication Architecture for Smart Grids , 2011, IEEE Transactions on Industrial Electronics.
[30] Daojing He,et al. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks , 2011, Journal of Zhejiang University SCIENCE C.
[31] Benjamin C. M. Fung,et al. Anonymizing sequential releases , 2006, KDD '06.
[32] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[33] Lingfeng Wang,et al. A conceptual design using harmonics to reduce pilfering of electricity , 2010, IEEE PES General Meeting.
[34] Muhammad Haneef,et al. Design Challenges and Comparative Analysis of Cluster Based Routing Protocols Used in Wireless Sensor Networks for Improving Network Life Time , 2012 .
[35] A. Vojdani,et al. Smart Integration , 2008, IEEE Power and Energy Magazine.
[36] M. Chebbo. EU SmartGrids Framework "Electricity Networks of the future 2020 and beyond" , 2007, 2007 IEEE Power Engineering Society General Meeting.
[37] Kenneth C. Budka,et al. Communication network architecture and design principles for smart grids , 2010 .
[38] Kim Chang,et al. Global Wireless Machine-to-Machine Standardization , 2011, IEEE Internet Computing.
[39] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[40] Ronald J. Deibert,et al. Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.
[41] Rongbo Zhu. Efficient Fault-Tolerant Event Query Algorithm in Distributed Wireless Sensor Networks , 2010, Int. J. Distributed Sens. Networks.
[42] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[43] Jarmo Partanen,et al. Smart grid power system control in distributed generation environment , 2009 .