IP2DM: integrated privacy-preserving data management architecture for smart grid V2G networks
暂无分享,去创建一个
[1] Lixin Xu,et al. Research of security structure model for web application systems based on the relational database , 2015, Int. J. Secur. Networks.
[2] Vinod Vaikuntanathan,et al. Computing Blindfolded: New Developments in Fully Homomorphic Encryption , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[3] Yang Xiao,et al. NFD: A practical scheme to detect non-technical loss fraud in smart grid , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] Zhenyu Yang,et al. $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid , 2011, IEEE Transactions on Smart Grid.
[5] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[6] Chuang Lin,et al. An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[7] Christoph Sorge,et al. Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.
[8] Yang Xiao,et al. PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks , 2015, Wirel. Commun. Mob. Comput..
[9] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Yang Xiao,et al. Non-repudiation in neighborhood area networks for smart grid , 2013, IEEE Communications Magazine.
[12] Chunqiang Hu,et al. FPODG: a flexible and private proximity testing based on 'one degree' grid , 2016, Int. J. Sens. Networks.
[13] Guilin Zheng,et al. Residential Appliances Identification and Monitoring by a Nonintrusive Method , 2012, IEEE Transactions on Smart Grid.
[14] Dogan Kesdogan,et al. V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid , 2012, CSS.
[15] Yang Xiao,et al. Accountable Administration and Implementation in Operating Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[16] Yang Xiao,et al. FNFD: A Fast Scheme to Detect and Verify Non-Technical Loss Fraud in Smart Grid , 2016 .
[17] Yang Xiao,et al. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks , 2011, Comput. Networks.
[18] Yang Xiao,et al. Non-Technical Loss Fraud in Advanced Metering Infrastructure in Smart Grid , 2016, ICCCS.
[19] Yang Xiao,et al. A Survey of Payment Card Industry Data Security Standard , 2010, IEEE Communications Surveys & Tutorials.
[20] Joseph K. Liu,et al. Enhancing Location Privacy for Electric Vehicles (at the Right time) , 2012, ESORICS.
[21] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[22] Robert F. Mills,et al. Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.
[23] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[24] Naixue Xiong,et al. A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[25] Yang Xiao,et al. A survey of communication/networking in Smart Grids , 2012, Future Gener. Comput. Syst..
[26] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[27] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[28] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[29] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[30] Nei Kato,et al. A Lightweight Message Authentication Scheme for Smart Grid Communications , 2011, IEEE Transactions on Smart Grid.
[31] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[32] Huei-Ru Tseng,et al. A secure and privacy-preserving communication protocol for V2G networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[33] Yang Xiao,et al. Accountable administration in operating systems , 2017, Int. J. Inf. Comput. Secur..
[34] Yang Xiao,et al. Privacy preservation for V2G networks in smart grid: A survey , 2016, Comput. Commun..
[35] Yang Xiao,et al. CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid , 2016, WASA.
[36] Shengli Xie,et al. Cognitive machine-to-machine communications: visions and potentials for the smart grid , 2012, IEEE Network.
[37] David A. Wagner,et al. Cryptanalysis of an Algebraic Privacy Homomorphism , 2003, ISC.
[38] Xindong Wu,et al. Security and privacy protocols for perceptual image hashing , 2015, Int. J. Sens. Networks.
[39] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[40] Dogan Kesdogan,et al. Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction , 2011, EuroPKI.
[41] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[42] Yang Xiao. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.
[43] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[44] Jing Liu,et al. Achieving Accountability in Smart Grid , 2014, IEEE Systems Journal.
[45] Dogan Kesdogan,et al. Location Privacy for Vehicle-to-Grid Interaction through Battery Management , 2012, 2012 Ninth International Conference on Information Technology - New Generations.
[46] Sonali Kale,et al. Fuzzy Keyword Search over Encrypted Data in Cloud , 2017 .
[47] Yang Xiao,et al. Exploring Malicious Meter Inspection in Neighborhood Area Smart Grids , 2013, IEEE Transactions on Smart Grid.
[48] Hamid Gharavi. Smart Grid: The Electric Energy System of the Future , 2011 .
[49] Renato J. Orsato,et al. The emergence of an electric mobility trajectory , 2013 .
[50] Laurence T. Yang,et al. Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid , 2012, IEEE Transactions on Smart Grid.
[51] Daniele Micciancio,et al. The Geometry of Lattice Cryptography , 2011, FOSAD.
[52] Dieter Kopp,et al. E-mobility in the context of electric energy distribution grids , 2011, Bell Labs Technical Journal.
[53] Marten van Dijk,et al. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.
[54] Bo Fu,et al. SCADA communication and security issues , 2014, Secur. Commun. Networks.
[55] Hwangnam Kim,et al. A Secure Framework for Protecting Customer Collaboration in Intelligent Power Grids , 2011, IEEE Transactions on Smart Grid.
[56] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[57] Yang Lei,et al. Research of privacy-preserving data aggregation algorithm for wireless sensor network , 2014 .
[58] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[59] Cyril Guyot,et al. The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing , 2012, Cryptologia.
[60] Wenlin Han,et al. Cybersecurity in Internet of Things (IoT) , 2017 .
[61] Hamed Mohsenian Rad,et al. Vehicle-to-Aggregator Interaction Game , 2012, IEEE Transactions on Smart Grid.
[62] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[63] Yang Xiao,et al. Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid , 2016, ICCCS.
[64] Yang Xiao,et al. IP2DM for V2G networks in Smart Grid , 2015, 2015 IEEE International Conference on Communications (ICC).
[65] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[66] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[67] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[68] Jin Wang,et al. A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .
[69] Jussipekka Leiwo,et al. A Study on the Security of Privacy Homomorphism , 2008 .
[70] George Gross,et al. A conceptual framework for the vehicle-to-grid (V2G) implementation , 2009 .
[71] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[72] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..