Research on data security of multicast transmission based on certificateless multi-recipient signcryption in AMI
暂无分享,去创建一个
[1] Kemal Akkaya,et al. Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.
[2] Sasi K. Kottayil,et al. Hybrid Key Management Scheme for Secure AMI Communications , 2016 .
[3] Chao-Lin Kuo,et al. Non-Cooperative Game Model Applied to an Advanced Metering Infrastructure for Non-Technical Loss Screening in Micro-Distribution Systems , 2014, IEEE Transactions on Smart Grid.
[4] Yacine Challal,et al. VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems , 2018, Comput. Networks.
[5] Shiyan Hu,et al. Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation , 2016, IEEE Transactions on Smart Grid.
[6] Ying-Hao Hung,et al. Efficient Anonymous Multireceiver Certificateless Encryption , 2017, IEEE Systems Journal.
[7] Wen-Long Chin,et al. A Framework of Machine-to-Machine Authentication in Smart Grid: A Two-Layer Approach , 2016, IEEE Communications Magazine.
[8] Liaojun Pang,et al. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity , 2016, PloS one.
[9] Vitaly Ford,et al. Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis , 2017, J. Comput. Syst. Sci..
[10] Fan Ai-wa. Application of Certificateless Signcryption Scheme to Smart Grids , 2014 .
[11] Ali Chehab,et al. Identity Based Key Distribution Framework for Link Layer Security of AMI Networks , 2018, IEEE Transactions on Smart Grid.
[12] He De. Security Analysis of a Certificateless Signcryption Scheme , 2013 .
[13] Xie Yong,et al. Anonymous Mutual Authentication and Key Agreement Protocol in Multi-Server Architecture for VANETs , 2016 .
[14] John R. Williams,et al. Efficient and fault-diagnosable authentication architecture for AMI in smart grid , 2015, Secur. Commun. Networks.
[15] A.H. Nizar,et al. Power Utility Nontechnical Loss Analysis With Extreme Learning Machine Method , 2008, IEEE Transactions on Power Systems.
[16] Xia Zhou,et al. Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model , 2016, Int. J. Distributed Sens. Networks.
[17] Chunhua Jin,et al. Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.
[18] Victor C. M. Leung,et al. Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.