최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기The journal of the institute of internet, broadcasting and communication : JIIBC, v.18 no.3, 2018년, pp.49 - 59
김용길 (조선이공대학교 컴퓨터 보안과) , 문경일 (호남대학교 공과대학 컴퓨터공학과)
Smart grid system has been deployed fast despite of legal, business and technology problems in many countries. One important problem in deploying the smart grid system is to protect private smart meter readings from the unbelievable parties while the major smart meter functions are untouched. Privac...
R. Anderson and S. Fuloria. "On the security economics of electricity metering". In The 9th Workshop on the Economics of Information Security, 2010.
C. Castelluccia, E. Mykletun, and G. Tsudik. "Efficient aggregation of encrypted data in wireless sensor networks". In Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Washington, DC, USA, IEEE Computer Society. pp. 109 - 117, 2005. DOI : doi>10.1109/MOBIQUITOUS.2005.25
F. D. Garcia and B. Jacobs. "Privacy-friendly energy-metering via homomorphic encryption". In J. C. et al., editor, 6th Workshop on Security and Trust Management (STM 2010), volume 6710 of Lecture Notes in Computer Science, pp. 226 - 238. Springer Verlag, 2010. DOI : doi> 10.1007/978-3-642-22444-7_15
M. Jawurek, M. Johns, and F. Kerschbaum. "Plug-in privacy for smart metering billing". In PETS, pp. 192 - 210, 2011.
M. Kohlweiss and G. Danezis. "Differentially private billing with rebates". In Information Hiding Conference, LNCS, pp. 148-162. Springer, May 18-20 2011. DOI : doi>I 10.1007/978-3-642-24178-9_11
A. Rial and G. Danezis. "Privacy-preserving smart metering". In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES' 11, New York, NY, USA, ACM. pp. 49 - 60, 2011. DOI: doi>10.1145/2046556.2046564
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. "Handbook of Applied Cryptography". CRC Press, Inc., Boca Raton, FL, USA, 1st edition, 1996.
P. Paillier. "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes". In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, vol 1592 of LNCS, pp. 223 - 238. Springer, May 2-6, 1999. DOI : doi> 10.1007/3-540-48910-x_16
S. Peter, K. Piotrowski, and P. Langendoerfer. "On concealed data aggregation for wireless sensor networks". In 4th IEEE Consumer Communications and Networking Conferences, 2007. DOI: doi>10.1.1.61.5158
S. Alishahi, S. M. Seyyedi, M. H. Yaghmaee and M. Alishahi, "Preserving integrity and privacy of data in smart grid communications", CIRED Workshop - Rome, 11-12, Paper 0225, June 2014.
Y.G. Kim, K.I. Moon, "Adaptive Time Delay Compensation Process in Networked Control System", The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 5 No. 1, pp.34-46, 2016. DOI: doi>dx.doi.org/10.7236/IJASC2016.5.1.34
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.