Linked e-resources

Details

Preface; Scope; Audience; Recommended Background; Content; Highlights; Acknowledgments; Contents; List of Figures; List of Tables; List of Algorithms; List of Acronyms; List of Abbreviations; List of Symbols; Part I Foundations; 1 Introduction ; 1.1 Motivation; 1.2 Research Questions; 1.3 Contributions; 1.3.1 High Level Explanation of the Selected PPPs; 1.3.1.1 ppp1; 1.3.1.2 ppp2; 1.3.1.3 ppp3; 1.3.1.4 ppp4; 1.3.2 Summary of the Results; 1.4 Outline; References; 2 Background and Models ; 2.1 Smart Grids Around the World; 2.2 Security and Privacy Models; 2.2.1 Terminology in PPPs

2.2.2 Security Model2.2.2.1 Attack Model; 2.2.2.2 Trust Model; 2.2.2.3 Considerations About the Cryptographic Functions; 2.2.3 Privacy Model; 2.2.3.1 Attack Model; 2.2.3.2 Trust Model; References; 3 A Selective Review ; 3.1 Solutions with Restrictive Result; 3.1.1 Data Obfuscation by Means of Storage Banks; 3.1.2 Anonymization Via Pseudonymous; 3.1.3 Data Obfuscation by Means of Noise Injection; 3.2 Solutions Addressed in This Book: Anonymization Via Cryptographic Protocols; 3.2.1 Protocols Based on Homomorphic Encryption; 3.2.2 Protocols Based on DC-Nets; 3.2.3 Protocols Based on Commitment

6.3.1 Cryptographic Primitives6.3.2 Proposed Protocol; 6.3.2.1 Privacy-Unfriendly Individual m Verification; 6.3.2.2 Aggregated m Verification; 6.3.2.3 Detecting Deceptive u; 6.3.2.4 Billing Verification; 6.3.3 Security Analysis; 6.3.4 Privacy Analysis; 6.3.5 Performance Analysis; 6.4 PPP3 Based on Asymmetric DC-Nets; 6.4.1 Cryptographic Primitives; 6.4.1.1 Properties from the Definition; 6.4.1.2 Derived Properties; 6.4.1.3 adcn and Their Applications; 6.4.2 Attacker Model; 6.4.3 Proposed Protocol; 6.4.4 Verification Property; 6.4.4.1 Privacy-Unfriendly Individual m Verification

6.4.4.2 Aggregated m Verification6.4.4.3 Detecting Failures and Deceptive u; 6.4.4.4 Billing Verification; 6.4.5 Security Analysis; 6.4.6 Privacy Analysis; 6.4.7 Performance Analysis; 6.5 PPP4 Based on Quantum Mechanics; 6.5.1 Cryptographic Primitives; 6.5.2 Proposed Protocol; 6.5.3 Security Analysis; 6.5.4 Privacy Analysis; References; 7 Analytical Comparison; 7.1 Security; 7.2 Privacy; 7.3 Requirements; 7.4 Verification Property; 7.5 Performance; 7.6 Summary; References; 8 Simulation and Validation; 8.1 Dataset; 8.1.1 Anomalies; 8.1.2 Sanitized Dataset; 8.1.3 Dataset Characteristics

Browse Subjects

Show more subjects...

Statistics

from
to
Export