Privacy-Aware Smart Metering: A Survey
暂无分享,去创建一个
[1] Frederik Armknecht,et al. A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing , 2008, Comput. Commun..
[2] Sanjam Garg,et al. Unified Architecture for Large-Scale Attested Metering , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[5] M. Baranski,et al. Genetic algorithm for pattern detection in NIALM systems , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[6] A. Cavoukian,et al. SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation , 2010 .
[7] Conversion and delivery of electrical energy in the 21st century , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[8] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[9] Steven J. Vaughan-Nichols. How trustworthy is trusted computing? , 2003, Computer.
[10] A. Prudenzi,et al. A neuron nets based procedure for identifying domestic appliances pattern-of-use from energy recordings at meter panel , 2002, 2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309).
[11] Andrew Y. Ng,et al. Energy Disaggregation via Discriminative Sparse Coding , 2010, NIPS.
[12] Mahesh Sooriyabandara,et al. Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.
[13] Wenyuan Xu,et al. Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.
[14] Geert Deconinck,et al. Analysis of State-of-the-art Smart Metering Communication Standards , 2010 .
[15] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[16] Ingmar Baumgart,et al. Elderberry: A peer-to-peer, privacy-aware smart metering protocol , 2013, 2013 Proceedings IEEE INFOCOM.
[17] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[18] F. Sultanem,et al. Using appliance signatures for monitoring residential loads at meter panel level , 1991 .
[19] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[20] M. Lisovich,et al. Privacy Concerns in Upcoming Residential and Commercial Demand-Response Systems , 2008 .
[21] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[22] Christian Wietfeld,et al. Comparison of the communication protocols DLMS/COSEM, SML and IEC 61850 for smart metering applications , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[23] Patrick D. McDaniel,et al. Protecting consumer privacy from electric load monitoring , 2011, CCS '11.
[24] Yi Xu,et al. A survey on the communication architectures in smart grid , 2011, Comput. Networks.
[25] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[26] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[27] Stephen B. Wicker,et al. Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.
[28] Georgios Kalogridis,et al. Affordable Privacy for Home Smart Meters , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[29] G. Schwartz,et al. Privacy-Aware Sampling for Residential Demand Response Programs , 2012 .
[30] Dirk Westhoff,et al. Privacy-enhanced architecture for smart metering , 2012, International Journal of Information Security.
[31] Friedemann Mattern,et al. Leveraging smart meter data to recognize home appliances , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[32] Christoph Sorge,et al. Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.
[33] Steven B. Leeb,et al. Power signature analysis , 2003 .
[34] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .
[35] David Pointcheval,et al. Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.
[36] Ronald Petrlic,et al. A privacy-preserving Concept for Smart Grids , 2010 .
[37] Florian Kerschbaum,et al. Plug-In Privacy for Smart Metering Billing , 2010, PETS.
[38] Mani B. Srivastava,et al. Cooperative state estimation for preserving privacy of user behaviors in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[39] George Danezis,et al. Privacy-preserving smart metering , 2011, ISSE.
[40] Dirk Westhoff,et al. Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture , 2012, SECRYPT.
[41] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[42] G.W. Hart,et al. Residential energy monitoring and computerized surveillance via utility power flows , 1989, IEEE Technology and Society Magazine.
[43] Bart Jacobs,et al. Privacy-Friendly Energy-Metering via Homomorphic Encryption , 2010, STM.
[44] H. Vincent Poor,et al. Smart meter privacy: A utility-privacy framework , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[45] H. Y. Lam,et al. A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.
[46] Christoph Sorge,et al. A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.
[47] Mathias Uslar,et al. Survey of Smart Grid Standardization Studies and Recommendations , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[48] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[49] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[50] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[51] Peng Liu,et al. Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.
[52] Ingmar Baumgart,et al. Pseudonymous Smart Metering without a Trusted Third Party , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[53] D.G. Hart,et al. Using AMI to realize the Smart Grid , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[54] Marek Jawurek,et al. Smart metering de-pseudonymization , 2011, ACSAC '11.