|
[1] G. Hart, “Nonintrusive appliance load monitoring,” Proc. IEEE, vol. 80, no. 12, pp. 1870–1891, Dec. 1992. [2] Christopher Laughman, Kwangduk Lee, Robert Cox, Steven Shaw, Steven Leeb, Les Norford, and Peter Armstrong, “Power signature analysis,” IEEE Power Energy Mag., vol. 1, no. 2, pp. 56–63, Mar./Apr. 2003. [3] T-H. Hubert Chan, Elaine Shi, and Dawn Song,”Privacy-preserving stream aggregation with fault tolerance,”in Financial Cryptography and Data Security (Lecture Notes in Computer Science 7397), A.Keromytis, Ed. Berlin, Germany: Springer-Verlag, 2012, pp.200–214. [4] Gergely Acs and Claude Castelluccia,”I have a DREAM! (DiffeRentially privatE smArt Metering)” in Proc. 13th Inf. Hiding Conf., Berlin, Germany, 2011, pp. 118– 132. [5] Marco Savi, Cristina Rottondi, and Giacomo Verticale. “Evaluation of the PrecisionPrivacy Tradeoff of Data Perturbation for Smart Metering,” IEEE Transactions on Smart Grid, Vol.6, No.5, pp. 2409-2417. [6] Jiang, Wei, Mummoorthy Murugesan, Chris Clifton and Luo Si. “Similar document detection with limited information disclosure,” Data Engineering 2008, ICDE 2008, IEEE 24th International Conference on. IEEE, 2008. [7] H. Krawczyk, M. Bellare and R. Canetti. “Network Working Group Request for Comments: 2104,” Februray 1997. [8] Donald Knuths, “The Art of Computer Programming,” Volume 2. [9] J.-Y. Huang, W.-C. Hong, P.-S. Tsai, I-E. Liao, “A Model for Aggregation and Filtering on Encrypted XML Streams in Fog Computing,” International Journal of Distributed Sensor Networks, vol. 13, no. 5, May 2017. [10] B.Goethals, S.Laur, H. Lipmaa, and T.Mielikainen, “On secure scalar product computation for privacy-preserving data mining,” in The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), C.Park and S.Chee, Eds., Seoul, Korea, Dec.2-3 2004, pp.104-120. [11] Fred Sissine, Coordinator Specialist in Energy Policy Resources, Science, and Industry Division,”Energy Independence and Security Act of 2007: A Summary of Major Provisions,”December 21, 2007.
|