PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice
暂无分享,去创建一个
[1] Xiaohui Liang,et al. EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] H. Li,et al. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.
[3] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Jin Li,et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.
[6] Thanasis Korakis,et al. Network Store: Exploring Slicing in Future 5G Networks , 2015, MobiArch.
[7] Yinghui Zhang,et al. Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks , 2017, Mob. Inf. Syst..
[8] Jin Cao,et al. A group-based authentication and key agreement for MTC in LTE networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[9] Xiaodong Lin,et al. MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.
[10] Ufuk Topcu,et al. Optimal decentralized protocol for electric vehicle charging , 2011, IEEE Transactions on Power Systems.
[11] H. Vincent Poor,et al. Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks , 2014, IEEE Wireless Communications Letters.
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[14] Ismail Güvenç,et al. Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks , 2016, IEEE Internet of Things Journal.
[15] Xuemin Shen,et al. A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[16] Kemal Akkaya,et al. Privacy-preserving and secure communication scheme for power injection in smart grid , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[17] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[18] Kemal Akkaya,et al. Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters , 2017, IEEE Transactions on Dependable and Secure Computing.
[19] Kemal Akkaya,et al. Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.
[20] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[21] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .