Privacy in a Digital, Networked World
暂无分享,去创建一个
[1] Sherali Zeadally,et al. An Improved Privacy Solution for the Smart Grid , 2016, Int. J. Netw. Secur..
[2] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[3] Klara Nahrstedt,et al. Practical and secure Machine-to-Machine data collection protocol in Smart Grid , 2014, 2014 IEEE Conference on Communications and Network Security.
[4] Shi Li,et al. OCPM: Ortho code privacy mechanism in smart grid using ring communication architecture , 2014, Ad Hoc Networks.
[5] Giacomo Verticale,et al. A privacy-friendly game-theoretic distributed scheduling system for domestic appliances , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[6] Hongwei Li,et al. PALDA: Efficient privacy-preserving authentication for lossless data aggregation in Smart Grids , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[7] Daisuke Mashima,et al. Privacy preserving disclosure of authenticated energy usage data , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[8] Klara Nahrstedt,et al. Secure data collection in constrained tree-based Smart Grid environments , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[9] Andrew P. Martin,et al. Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[10] Weiming Zhang,et al. Towards optimal noise distribution for privacy preserving in data aggregation , 2014, Comput. Secur..
[11] Dominik Egarter,et al. Load hiding of household's power demand , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[12] Xiaolei Dong,et al. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid , 2014, IEEE Systems Journal.
[13] Mahesh Sooriyabandara,et al. Toward Unified Security and Privacy Protection for Smart Meter Networks , 2014, IEEE Systems Journal.
[14] Sy-Yen Kuo,et al. Privacy-Preserving Power Request in Smart Grid Networks , 2014, IEEE Systems Journal.
[15] Massoud Hashemi,et al. Efficiency-Fairness Trade-off in Privacy-Preserving Autonomous Demand Side Management , 2014, IEEE Transactions on Smart Grid.
[16] Sherali Zeadally,et al. Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy , 2014, IEEE Transactions on Information Forensics and Security.
[17] Quanyan Zhu,et al. SELINDA: A secure, scalable and light-weight data collection protocol for smart grids , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[18] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[19] Wen Tao Zhu,et al. Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics , 2013, CSS.
[20] Chun-I Fan,et al. Design and implementation of privacy preserving billing protocol for smart grid , 2013, The Journal of Supercomputing.
[21] Xinyu Yang,et al. On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[22] Alexander Shraer,et al. Verifying cloud services: present and future , 2013, OPSR.
[23] Ingmar Baumgart,et al. Pseudonymous Smart Metering without a Trusted Third Party , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[24] Christoph Krauß,et al. Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids , 2013, IEEE Journal on Selected Areas in Communications.
[25] H. Vincent Poor,et al. Information theoretic privacy for smart meters , 2013, 2013 Information Theory and Applications Workshop (ITA).
[26] Giacomo Verticale,et al. Privacy-preserving smart metering with multiple data Consumers , 2013, Comput. Networks.
[27] Arbee L. P. Chen,et al. Anonymization for Multiple Released Social Network Graphs , 2013, PAKDD.
[28] Alessandro Acquisti,et al. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.
[29] Ragib Hasan,et al. SecLaaS: secure logging-as-a-service for cloud forensics , 2013, ASIA CCS '13.
[30] Tamir Tassa,et al. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering , 2013, IEEE Transactions on Knowledge and Data Engineering.
[31] Indrajit Ray,et al. Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.
[32] Ingmar Baumgart,et al. Elderberry: A peer-to-peer, privacy-aware smart metering protocol , 2013, 2013 Proceedings IEEE INFOCOM.
[33] Nishchol Mishra,et al. Privacy in Social Networks : A Survey , 2013 .
[34] H. Vincent Poor,et al. Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.
[35] Siu-Ming Yiu,et al. Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner , 2012, ICICS.
[36] Tao Cui,et al. Secure multiparty computation based privacy preserving smart metering system , 2012, 2012 North American Power Symposium (NAPS).
[37] Michael K. Reiter,et al. Cross-VM side channels and their use to extract private keys , 2012, CCS.
[38] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[39] Jing Huang,et al. State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.
[40] Krishna P. Gummadi,et al. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.
[41] Zekeriya Erkin,et al. Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.
[42] Anna Cinzia Squicciarini,et al. An Informed Model of Personal Information Release in Social Networking Sites , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[43] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[44] Christoph Sorge,et al. Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.
[45] Engin Kirda,et al. A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[46] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[47] Shams Zawoad. Towards Building Proofs of Past Data Possession in Cloud Forensics , 2012 .
[48] G. Schwartz,et al. Privacy-Aware Sampling for Residential Demand Response Programs , 2012 .
[49] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[50] Mani B. Srivastava,et al. Cooperative state estimation for preserving privacy of user behaviors in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[51] Georgios Kalogridis,et al. Data Mining and Privacy of Personal Behaviour Types in Smart Grid , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.
[52] Siani Pearson,et al. End-to-End Policy-Based Encryption and Management of Data in the Cloud , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.
[53] Haibo Chen,et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.
[54] XiaoFeng Wang,et al. Sedic: privacy-aware data intensive computing on hybrid clouds , 2011, CCS '11.
[55] Siani Pearson,et al. Sticky Policies: An Approach for Managing Privacy across Multiple Parties , 2011, Computer.
[56] Georgios Kalogridis,et al. ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.
[57] H. Vincent Poor,et al. Smart meter privacy: A utility-privacy framework , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[58] George Danezis,et al. Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.
[59] Claude Castelluccia,et al. I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.
[60] Wenbo He,et al. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[61] Sadie Creese,et al. The Cloud: Understanding the Security, Privacy and Trust Challenges , 2011 .
[62] Hamid Sharif,et al. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[63] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[64] Privacy, Accountability and Trust – Challenges and Opportunities , 2011 .
[65] A. Perrig,et al. Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005) , 2011 .
[66] Junqi Liu,et al. A user-centric privacy manager for future energy systems , 2010, 2010 International Conference on Power System Technology.
[67] Anna Cinzia Squicciarini,et al. Privacy policies for shared content in social network sites , 2010, The VLDB Journal.
[68] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[69] Husheng Li,et al. Compressed Meter Reading for Delay-Sensitive and Secure Load Report in Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[70] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[71] Bart Jacobs,et al. Privacy-Friendly Energy-Metering via Homomorphic Encryption , 2010, STM.
[72] Christoph Sorge,et al. A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.
[73] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[74] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[75] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[76] Ian Sommerville,et al. Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[77] Seda F. Gürses,et al. A critical review of 10 years of Privacy Technology , 2010 .
[78] Yanpei Chen,et al. What's New About Cloud Computing Security? , 2010 .
[79] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[80] J. Lewis,et al. Students' Facebook ‘friends’: public and private spheres , 2009 .
[81] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[82] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[83] F. John Krautheim,et al. Private Virtual Infrastructure for Cloud Computing , 2009, HotCloud.
[84] Tim Roughgarden,et al. Universally utility-maximizing privacy mechanisms , 2008, STOC '09.
[85] S. Singhal,et al. Outsourcing Business to Cloud Computing Services: Opportunities and Challenges , 2009 .
[86] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[87] K. Nahrstedt,et al. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[88] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[89] Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[90] Jian Pei,et al. Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[91] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[92] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[93] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[94] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[95] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[96] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[97] Patti M. Valkenburg,et al. Friend Networking Sites and Their Relationship to Adolescents' Well-Being and Social Self-Esteem , 2006, Cyberpsychology Behav. Soc. Netw..
[98] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[99] Emmanuel J. Candès,et al. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.
[100] E. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[101] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[102] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[103] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[104] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[105] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[106] Yuval Ishai,et al. Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.
[107] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[108] David Pointcheval,et al. Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.
[109] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[110] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[111] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[112] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[113] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[114] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[115] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[116] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[117] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[118] Adi Shamir,et al. How to share a secret , 1979, CACM.
[119] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[120] Jennifer Wallis,et al. On Hadamard matrices , 1975 .
[121] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.