Privacy in a Digital, Networked World

[1]  Sherali Zeadally,et al.  An Improved Privacy Solution for the Smart Grid , 2016, Int. J. Netw. Secur..

[2]  S. Frick,et al.  Compressed Sensing , 2014, Computer Vision, A Reference Guide.

[3]  Klara Nahrstedt,et al.  Practical and secure Machine-to-Machine data collection protocol in Smart Grid , 2014, 2014 IEEE Conference on Communications and Network Security.

[4]  Shi Li,et al.  OCPM: Ortho code privacy mechanism in smart grid using ring communication architecture , 2014, Ad Hoc Networks.

[5]  Giacomo Verticale,et al.  A privacy-friendly game-theoretic distributed scheduling system for domestic appliances , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[6]  Hongwei Li,et al.  PALDA: Efficient privacy-preserving authentication for lossless data aggregation in Smart Grids , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[7]  Daisuke Mashima,et al.  Privacy preserving disclosure of authenticated energy usage data , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[8]  Klara Nahrstedt,et al.  Secure data collection in constrained tree-based Smart Grid environments , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[9]  Andrew P. Martin,et al.  Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[10]  Weiming Zhang,et al.  Towards optimal noise distribution for privacy preserving in data aggregation , 2014, Comput. Secur..

[11]  Dominik Egarter,et al.  Load hiding of household's power demand , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[12]  Xiaolei Dong,et al.  Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid , 2014, IEEE Systems Journal.

[13]  Mahesh Sooriyabandara,et al.  Toward Unified Security and Privacy Protection for Smart Meter Networks , 2014, IEEE Systems Journal.

[14]  Sy-Yen Kuo,et al.  Privacy-Preserving Power Request in Smart Grid Networks , 2014, IEEE Systems Journal.

[15]  Massoud Hashemi,et al.  Efficiency-Fairness Trade-off in Privacy-Preserving Autonomous Demand Side Management , 2014, IEEE Transactions on Smart Grid.

[16]  Sherali Zeadally,et al.  Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy , 2014, IEEE Transactions on Information Forensics and Security.

[17]  Quanyan Zhu,et al.  SELINDA: A secure, scalable and light-weight data collection protocol for smart grids , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[18]  Vijay Varadharajan,et al.  Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.

[19]  Wen Tao Zhu,et al.  Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics , 2013, CSS.

[20]  Chun-I Fan,et al.  Design and implementation of privacy preserving billing protocol for smart grid , 2013, The Journal of Supercomputing.

[21]  Xinyu Yang,et al.  On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[22]  Alexander Shraer,et al.  Verifying cloud services: present and future , 2013, OPSR.

[23]  Ingmar Baumgart,et al.  Pseudonymous Smart Metering without a Trusted Third Party , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[24]  Christoph Krauß,et al.  Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids , 2013, IEEE Journal on Selected Areas in Communications.

[25]  H. Vincent Poor,et al.  Information theoretic privacy for smart meters , 2013, 2013 Information Theory and Applications Workshop (ITA).

[26]  Giacomo Verticale,et al.  Privacy-preserving smart metering with multiple data Consumers , 2013, Comput. Networks.

[27]  Arbee L. P. Chen,et al.  Anonymization for Multiple Released Social Network Graphs , 2013, PAKDD.

[28]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[29]  Ragib Hasan,et al.  SecLaaS: secure logging-as-a-service for cloud forensics , 2013, ASIA CCS '13.

[30]  Tamir Tassa,et al.  Anonymization of Centralized and Distributed Social Networks by Sequential Clustering , 2013, IEEE Transactions on Knowledge and Data Engineering.

[31]  Indrajit Ray,et al.  Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.

[32]  Ingmar Baumgart,et al.  Elderberry: A peer-to-peer, privacy-aware smart metering protocol , 2013, 2013 Proceedings IEEE INFOCOM.

[33]  Nishchol Mishra,et al.  Privacy in Social Networks : A Survey , 2013 .

[34]  H. Vincent Poor,et al.  Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.

[35]  Siu-Ming Yiu,et al.  Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner , 2012, ICICS.

[36]  Tao Cui,et al.  Secure multiparty computation based privacy preserving smart metering system , 2012, 2012 North American Power Symposium (NAPS).

[37]  Michael K. Reiter,et al.  Cross-VM side channels and their use to extract private keys , 2012, CCS.

[38]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[39]  Jing Huang,et al.  State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.

[40]  Krishna P. Gummadi,et al.  Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.

[41]  Zekeriya Erkin,et al.  Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.

[42]  Anna Cinzia Squicciarini,et al.  An Informed Model of Personal Information Release in Social Networking Sites , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[43]  Sushmita Ruj,et al.  Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).

[44]  Christoph Sorge,et al.  Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.

[45]  Engin Kirda,et al.  A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).

[46]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[47]  Shams Zawoad Towards Building Proofs of Past Data Possession in Cloud Forensics , 2012 .

[48]  G. Schwartz,et al.  Privacy-Aware Sampling for Residential Demand Response Programs , 2012 .

[49]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[50]  Mani B. Srivastava,et al.  Cooperative state estimation for preserving privacy of user behaviors in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[51]  Georgios Kalogridis,et al.  Data Mining and Privacy of Personal Behaviour Types in Smart Grid , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.

[52]  Siani Pearson,et al.  End-to-End Policy-Based Encryption and Management of Data in the Cloud , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[53]  Haibo Chen,et al.  CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.

[54]  XiaoFeng Wang,et al.  Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.

[55]  Siani Pearson,et al.  Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.

[56]  Georgios Kalogridis,et al.  ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.

[57]  H. Vincent Poor,et al.  Smart meter privacy: A utility-privacy framework , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[58]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[59]  Claude Castelluccia,et al.  I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.

[60]  Wenbo He,et al.  KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[61]  Sadie Creese,et al.  The Cloud: Understanding the Security, Privacy and Trust Challenges , 2011 .

[62]  Hamid Sharif,et al.  A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[63]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[64]  Privacy, Accountability and Trust – Challenges and Opportunities , 2011 .

[65]  A. Perrig,et al.  Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005) , 2011 .

[66]  Junqi Liu,et al.  A user-centric privacy manager for future energy systems , 2010, 2010 International Conference on Power System Technology.

[67]  Anna Cinzia Squicciarini,et al.  Privacy policies for shared content in social network sites , 2010, The VLDB Journal.

[68]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[69]  Husheng Li,et al.  Compressed Meter Reading for Delay-Sensitive and Secure Load Report in Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[70]  Jie Wu,et al.  Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.

[71]  Bart Jacobs,et al.  Privacy-Friendly Energy-Metering via Homomorphic Encryption , 2010, STM.

[72]  Christoph Sorge,et al.  A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.

[73]  Vitaly Shmatikov,et al.  Airavat: Security and Privacy for MapReduce , 2010, NSDI.

[74]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[75]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[76]  Ian Sommerville,et al.  Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[77]  Seda F. Gürses,et al.  A critical review of 10 years of Privacy Technology , 2010 .

[78]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[79]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[80]  J. Lewis,et al.  Students' Facebook ‘friends’: public and private spheres , 2009 .

[81]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[82]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[83]  F. John Krautheim,et al.  Private Virtual Infrastructure for Cloud Computing , 2009, HotCloud.

[84]  Tim Roughgarden,et al.  Universally utility-maximizing privacy mechanisms , 2008, STOC '09.

[85]  S. Singhal,et al.  Outsourcing Business to Cloud Computing Services: Opportunities and Challenges , 2009 .

[86]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[87]  K. Nahrstedt,et al.  iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[88]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[89]  Wensheng Zhang,et al.  Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[90]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[91]  Wilson C. Hsieh,et al.  Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.

[92]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[93]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[94]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[95]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[96]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[97]  Patti M. Valkenburg,et al.  Friend Networking Sites and Their Relationship to Adolescents' Well-Being and Social Self-Esteem , 2006, Cyberpsychology Behav. Soc. Netw..

[98]  Moni Naor,et al.  Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.

[99]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[100]  E. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[101]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[102]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[103]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[104]  Clifford C. Cocks An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.

[105]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[106]  Yuval Ishai,et al.  Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.

[107]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[108]  David Pointcheval,et al.  Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.

[109]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[110]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[111]  Ronald Cramer,et al.  A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.

[112]  Jan Camenisch,et al.  Fair Blind Signatures , 1995, EUROCRYPT.

[113]  Silvio Micali,et al.  Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.

[114]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[115]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[116]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[117]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[118]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[119]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[120]  Jennifer Wallis,et al.  On Hadamard matrices , 1975 .

[121]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.