ISSE 2012 Securing Electronic Business Processes 2012
DOI: 10.1007/978-3-658-00333-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Smart Metering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
78
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(78 citation statements)
references
References 18 publications
0
78
0
Order By: Relevance
“…12. a) Load shaping and b) battery power mixing Other schemes include Rial and Danezis' (Rial & Danezis, 2010) privacy preserving smart metering scheme. In this scheme, the smart meter provides certified readings to the user who then combines with a certified tariff policy to generate a final bill.…”
Section: Privacy Issuesmentioning
confidence: 99%
“…12. a) Load shaping and b) battery power mixing Other schemes include Rial and Danezis' (Rial & Danezis, 2010) privacy preserving smart metering scheme. In this scheme, the smart meter provides certified readings to the user who then combines with a certified tariff policy to generate a final bill.…”
Section: Privacy Issuesmentioning
confidence: 99%
“…On input the certified readings, the computational devices can communicate with the service provider and enjoy data analysis or other services. A similar architecture can also be found in [38]. Note that we assume the service provider collects the readings from the users and provides the statistics services for free.…”
Section: Introductionmentioning
confidence: 91%
“…These protocols are mainly designed against the energy supplier. Billing protocols [32,3,12,38,11,21] allow energy supplier to charge users according to their consumption. The energy supplier can learn the final consumption or bill of a user for a period of time (e.g.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The metering example is an implementation of a privacyfriendly protocol for smart electricity meters [48] developed at Microsoft Research. In the work reported in [5], an IML model of the protocol was extracted which revealed several bugs, but there was no verification result because the protocol uses XOR and Diffie-Hellman commitments.…”
Section: Implementation and Experimentsmentioning
confidence: 99%