2015 15th International Conference on Innovations for Community Services (I4CS) 2015
DOI: 10.1109/i4cs.2015.7294485
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-friendly smart metering architecture with few-instance storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Highlighted IoT Privacy Threats cryptographic algorithms, control access management tools, data minimization techniques, and privacy or context awareness protocols (Table I). [1], [67], [44], [36], [18], [53], [22], [5], [64], [30], [7], [13], [77], [59], [73] Data minimization 3 [15], [7], [59] Access control 6 [1], [31], [30], [13], [39], [59] Privacy awareness or context awareness 12 [1], [31], [55], [5], [81], [7], [71], [70], [77], [69], [59], [8] Differential Privacy 0 Other (introspection, trust assessment and evaluation) 3 [34], [6], [40] Not Evaluated Cryptographic techniques and information manipulation 16 [24], [25], [79], [9], [20], [51], [41], [54], [43], [26], [...…”
Section: Threats Solutions Principles Perceptionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Highlighted IoT Privacy Threats cryptographic algorithms, control access management tools, data minimization techniques, and privacy or context awareness protocols (Table I). [1], [67], [44], [36], [18], [53], [22], [5], [64], [30], [7], [13], [77], [59], [73] Data minimization 3 [15], [7], [59] Access control 6 [1], [31], [30], [13], [39], [59] Privacy awareness or context awareness 12 [1], [31], [55], [5], [81], [7], [71], [70], [77], [69], [59], [8] Differential Privacy 0 Other (introspection, trust assessment and evaluation) 3 [34], [6], [40] Not Evaluated Cryptographic techniques and information manipulation 16 [24], [25], [79], [9], [20], [51], [41], [54], [43], [26], [...…”
Section: Threats Solutions Principles Perceptionsmentioning
confidence: 99%
“…[34], [6], [40] Not Evaluated Cryptographic techniques and information manipulation 16 [24], [25], [79], [9], [20], [51], [41], [54], [43], [26], [45], [58], [47], [19], [2], [56] Data minimization 2 [25], [19] Access control 14 [25], [9], [57], [20], [41], [54], [26], [45], [58], [72], [47], [19], [29], [74] Privacy awareness or context awareness 9…”
mentioning
confidence: 99%