An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids
暂无分享,去创建一个
Chunqiang Hu | Hang Liu | Liran Ma | Shaojiang Deng | Liping Feng | Yan Huo | Shaojiang Deng | Liran Ma | Yan Huo | Hang Liu | Chun-qiang Hu | Liping Feng
[1] Ivan Stojmenovic,et al. A Security Architecture for Data Aggregation and Access Control in Smart Grids , 2011, ArXiv.
[2] Xiaofeng Liao,et al. Verifiable multi-secret sharing based on LFSR sequences , 2012, Theor. Comput. Sci..
[3] Chunqiang Hu,et al. Efficient privacy-preserving dot-product computation for mobile big data , 2017, IET Commun..
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Farrokh Albuyeh,et al. Grid of the future , 2009, IEEE Power and Energy Magazine.
[6] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[7] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[8] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[9] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[12] Jiguo Yu,et al. A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds , 2018, IEEE Transactions on Big Data.
[13] Jiguo Yu,et al. An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications , 2015, SecureComm.
[14] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[15] Sun Fengjie,et al. Security mechanism for smart distribution grid using Ethernet Passive Optical Network , 2010, 2010 2nd International Conference on Advanced Computer Control.
[16] John R. Williams,et al. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).
[17] Jianzhong Li,et al. Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[18] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[19] Zhipeng Cai,et al. FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.
[20] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[21] Qinghua Li,et al. Multicast Authentication in the Smart Grid With One-Time Signature , 2011, IEEE Transactions on Smart Grid.
[22] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[23] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[24] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[25] Tao Xiang,et al. Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2016, IEEE Transactions on Multi-Scale Computing Systems.