{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:14:56Z","timestamp":1743030896587,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319267616"},{"type":"electronic","value":"9783319267623"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26762-3_20","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T10:37:42Z","timestamp":1448966262000},"page":"224-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DPIP: A Demand Response Privacy Preserving Interaction Protocol"],"prefix":"10.1007","author":[{"given":"Markus","family":"Karwe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G\u00fcnter","family":"M\u00fcller","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,12,2]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.apenergy.2012.02.027","volume":"96","author":"N Arshad","year":"2012","unstructured":"Arshad, N., Dahlquist, E., Javed, F., Vassileva, I., Wallin, F.: Forecasting for demand response in smart grids: an analysis on use of anthropologic and structural data and short term multiple loads forecasting. Appl. Energy 96, 150\u2013160 (2012)","journal-title":"Appl. Energy"},{"key":"20_CR2","unstructured":"Avellana, N.: iURBAN Intelligent URBAN Energy Tool. FP7-SMARTCITIES-2013-608712 (2014). http:\/\/www.iurban-project.eu\/about-the-project-en\/related-projects.html Called 30 October 2014"},{"issue":"4","key":"20_CR3","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1287\/mnsc.10.4.667","volume":"10","author":"HH Baligh","year":"1964","unstructured":"Baligh, H.H., Richartz, L.E.: An analysis of vertical market structures. Manage. Sci. 10(4), 667\u2013689 (1964)","journal-title":"Manage. Sci."},{"key":"20_CR4","unstructured":"Bieser, G., Str\u00fcker, J., Weppner, H.: Intermediaries for the internet of energy - exchanging smart meter data as a business model. In: ECIS 2011 (2011)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"M Blaze","year":"1998","unstructured":"Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127\u2013144. Springer, Heidelberg (1998)"},{"key":"20_CR6","unstructured":"Brown, I., Martin, A., Paverd, A.: Security and privacy in smart grid demand response systems. In: Second Internaional Workshop, SmartGridSec2014, Munich Germany (2014)"},{"key":"20_CR7","unstructured":"Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Common Criteria, SMGW-PP, Version 1.3, 31 March 2014"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Cecchet, E., Fu, K., Irwin, D., Molina-Markham, A., Shenoy, P.: Private memoirs of a smart meter. In: BuildSys@SenSys 2010 (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"20_CR10","first-page":"135","volume":"1","author":"C Dwork","year":"2009","unstructured":"Dwork, C., Smith, A.: Differential privacy for statistics: what we know and what we want to learn. J. Privacy Confidentiality 1, 135\u2013154 (2009)","journal-title":"J. Privacy Confidentiality"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Eibl, G., Engel, D.: Influence of data granularity on nonintrusive appliance load monitoring. In: 2nd ACM Workshop on Information Hiding and Multimedia Security (2014)","DOI":"10.1145\/2600918.2600920"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.2228343","volume":"30","author":"Z Erkin","year":"2013","unstructured":"Erkin, Z., Troncoso-Pastoriza, J.R., Lagendijk, R.L., P\u00e9rez-Gonz\u00e1lez, F.: Privacy-preserving data aggregation in smart metering systems. IEEE Sig. Process. Mag. 30, 75\u201386 (2013)","journal-title":"IEEE Sig. Process. Mag."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Johns, M., Rieck, K.: Smart metering de-pseudonymization. In: ACSAC (2011)","DOI":"10.1145\/2076732.2076764"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies","author":"M Jawurek","year":"2011","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192\u2013210. Springer, Heidelberg (2011)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Kerschbaum, F., Orlandi, C.: Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently. In: ACM Conference on Computer and Communications Security 2013 (2013)","DOI":"10.1145\/2508859.2516662"},{"key":"20_CR16","unstructured":"Jeske, T.: Privacy-preserving smart metering without a trusted-third-party. In: SECRYPT 2011 (2011)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Karwe, M, Str\u00fcker, J.: Privacy in residential demand side management applications. In: Smart Grid Security: Second Internaional Workshop, SmartGridSec2014, Munich Germany (2014)","DOI":"10.1007\/978-3-319-10329-7_10"},{"key":"20_CR18","unstructured":"Kerschbaum, F., Str\u00fcker, J.: From a barrier to a bride: data-privacy in deregulated smart grids. In: Thirty Third International Journal Conference on Information Systems, Orlando USA (2012)"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","volume":"25","author":"H Li","year":"2014","unstructured":"Li, H., Lin, X., Yang, H., Liang, X., Lu, R., Shen, X.: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25, 2053\u20132064 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.enpol.2011.11.049","volume":"41","author":"E McKenna","year":"2012","unstructured":"McKenna, E., Richardson, I., Thomson, M.: Smart meter data: balancing consumer privacy with legitimate applications. Energy Policy 41, 807\u2013814 (2012)","journal-title":"Energy Policy"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Schaefer, C.: Mechanisms for usage control. In: ASIACCS (2008)","DOI":"10.1145\/1368310.1368344"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"7","DOI":"10.12720\/sgce.1.1.7-14","volume":"1","author":"F Skopik","year":"2012","unstructured":"Skopik, F.: Security is not enough! on privacy challenges in smart grids. Int. J. Smart Grid Clean Energy 1, 7\u201314 (2012)","journal-title":"Int. J. Smart Grid Clean Energy"},{"key":"20_CR24","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeny","year":"2002","unstructured":"Sweeny, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"20_CR25","volume-title":"Privacy and Freedom","author":"A Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Atheneum, New York (1967)"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26762-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T18:07:30Z","timestamp":1697911650000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-26762-3_20"}},"subtitle":["For Trusted Third Party Involvement"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319267616","9783319267623"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26762-3_20","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"2 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11169","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}