A Privacy Preserving Approach to Smart Metering
暂无分享,去创建一个
[1] Siani Pearson. Trusted Computing Platforms , the Next Security Solution , 2002 .
[2] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[3] A. Cavoukian,et al. SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation , 2010 .
[4] Jian Liang,et al. Load Signature Study—Part I: Basic Concept, Structure, and Methodology , 2010, IEEE Transactions on Power Delivery.
[5] Robert Schober,et al. Optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid , 2010, 2010 Innovative Smart Grid Technologies (ISGT).
[6] Ann Cavoukian. Patience, Persistence, and Faith: Evolving the Gold Standard in Privacy and Data Protection , 2011, SEC.
[7] Jian Liang,et al. Load Signature Study—Part II: Disaggregation Framework, Simulation, and Applications , 2010, IEEE Transactions on Power Delivery.
[8] Yasusi Sinohara,et al. Virtual energy demand data: Estimating energy load and protecting consumers' privacy , 2011, ISGT 2011.
[9] George Kesidis,et al. Incentive-Based Energy Consumption Scheduling Algorithms for the Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[10] Ian Richardson,et al. A high-resolution domestic building occupancy model for energy demand simulations , 2008 .
[11] Aaron Weiss. Trusted computing , 2006, NTWK.
[12] E. Quinn. Privacy and the New Energy Infrastructure , 2009 .
[13] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[14] Georgios Kalogridis,et al. Affordable Privacy for Home Smart Meters , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[15] Chen Chen,et al. An innovative RTP-based residential power scheduling scheme for smart grids , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] J. Miller,et al. The Institution of Electrical Engineers , 2006, Nature.
[17] Ahmad-Reza Sadeghi,et al. Trusted Computing , 2010, Handbook of Financial Cryptography and Security.
[18] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[19] Steven E. Collier,et al. Ten steps to a smarter grid , 2009, 2009 IEEE Rural Electric Power Conference.