Preserving privacy in Distributed Energy Management
暂无分享,去创建一个
Ralf Tönjes | Alfred Scheerhorn | Daniel Hölker | Daniel Brettschneider | R. Tönjes | Alfred Scheerhorn | Daniel Hölker | Daniel Brettschneider
[1] Vincent W. S. Wong,et al. Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid , 2010, IEEE Transactions on Smart Grid.
[2] Xiaohui Liang,et al. EDR: An efficient demand response scheme for achieving forward secrecy in smart grid , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[3] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[4] Sebastian Lehnhoff,et al. COHDA: A Combinatorial Optimization Heuristic for Distributed Agents , 2013, ICAART.
[5] J.K.A.H.P.J. Kok,et al. The PowerMatcher: Smart Coordination for the Smart Electricity Grid , 2013 .
[6] Xiaohui Liang,et al. UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[7] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[8] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[9] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] J. K. Kok,et al. PowerMatcher: multiagent control in the electricity infrastructure , 2005, AAMAS '05.
[11] Thomas R. Henderson,et al. Network Simulations with the ns-3 Simulator , 2008 .
[12] Ralf Tönjes,et al. Privacy-friendly distributed algorithm for energy management in smart grids , 2015, 2015 International Conference and Workshops on Networked Systems (NetSys).
[13] Ralf Tönjes,et al. On Homomorphic Encryption for privacy-preserving distributed load adaption in smart grids , 2016, 2016 IEEE International Conference on Communications (ICC).
[14] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.