共 37 条
[1]
AlAbdulkarim L., Lukszo Z., Fens T., Acceptance of privacy-sensitive technologies: smart metering case in the netherland, Third International Engineering System Symposium, CESUN 2012, (2012)
[2]
Ambrosin M., Hosseini H., Mandal K., Conti M., Poovendran R., Despicable me(ter): anonymous and fine-grained metering data reporting with dishonest meters, 2016 IEEE Conference on Communications and Network Security (CNS), (2016)
[3]
Chaum D., van Heyst E., Group signatures, Advances in Cryptology – EUROCRYPT ‘91, Vol. 547 of Lecture Notes in Computer Science, (1991)
[4]
Chen S., Wen H., Wu J., Lei W., Hou W., Liu W., Jiang Y., Internet of things based smart grids supported by intelligent edge computing, IEEE Access, 7, pp. 74089-74102, (2019)
[5]
Chen Y., Wen H., Wu J., Song H., Xu A., Jiang Y., Wang Z., Clustering based on physical-layer authentication in edge computing systems with asymmetric resources, Sensors, 19, 8, (2019)
[6]
Deng P., Yang L., A secure and privacy-preserving communication scheme for advanced metering infrastructure, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), (2012)
[7]
Farquharson J., Wang A., Howard J., Smart grid cyber security and substation network security, IEEE PES Innovative Smart Grid Technologies (ISGT), (2012)
[8]
Feng T., Wang F., Zhang W., Ruan L., Confidentiality Protection for Distributed Sensor Data Aggregation, Confidentiality Protection for Distributed Sensor Data Aggregation, (2008)
[9]
Ghosal A., Conti M., Key management systems for smart grid advanced metering infrastructure: a survey, IEEE Communications Surveys & Tutorials, (2019)
[10]
Gong Y., Cai Y., Guo Y., Fang Y., A privacy-preserving scheme for incentive-based demand response in the smart grid, IEEE Transactions on Smart Grid, 7, 3, pp. 1304-1313, (2016)