{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:23:18Z","timestamp":1764332598032,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319713670"},{"type":"electronic","value":"9783319713687"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71368-7_15","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:22:30Z","timestamp":1511248950000},"page":"176-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Selecting Privacy Solutions to Prioritise Control in Smart Metering Systems"],"prefix":"10.1007","author":[{"given":"Juan E.","family":"Rubio","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Alcaraz","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.ijepes.2014.06.025","volume":"63","author":"RR Mohassel","year":"2014","unstructured":"Mohassel, R.R., Fung, A., Mohammadi, F., Raahemifar, K.: A survey on advanced metering infrastructure. Int. J. Electr. Power Energy Syst. 63, 473\u2013484 (2014)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"15_CR2","unstructured":"Jawurek, M., Kerschbaum, F., Danezis, G.: Sok: Privacy technologies for smart grids-a survey of options. Microsoft Res., Cambridge, UK (2012)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Mahmud, R., Vallakati, R., Mukherjee, A., Ranganathan, P., Nejadpak, A.: A survey on smart grid metering infrastructures: threats and solutions. In: 2015 IEEE International Conference on Electro\/Information Technology (EIT), pp. 386\u2013391. IEEE (2015)","DOI":"10.1109\/EIT.2015.7293374"},{"key":"15_CR4","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1016\/j.procs.2014.05.537","volume":"32","author":"H Souri","year":"2014","unstructured":"Souri, H., Dhraief, A., Tlili, S., Drira, K., Belghith, A.: Smart metering privacy-preserving techniques in a nutshell. Proc. Comput. Sci. 32, 1087\u20131094 (2014)","journal-title":"Proc. Comput. Sci."},{"issue":"3","key":"15_CR5","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1109\/SURV.2014.052914.00090","volume":"16","author":"S Finster","year":"2014","unstructured":"Finster, S., Baumgart, I.: Privacy-aware smart metering: a survey. IEEE Commun. Surv. Tutorials 16(3), 1732\u20131745 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"15_CR6","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ijcip.2012.08.003","volume":"5","author":"C Alcaraz","year":"2012","unstructured":"Alcaraz, C., Lopez, J.: Analysis of requirements for critical control systems. Int. J. Crit. Infrastruct. Prot. (IJCIP) 5, 137\u2013145 (2012)","journal-title":"Int. J. Crit. Infrastruct. Prot. (IJCIP)"},{"key":"15_CR7","unstructured":"Brundtland Commission et al.: Our common future, Towards sustainable development. World Commission on Environment and Development (WCED). Geneva: United Nation (1987) Chap. 2"},{"issue":"2","key":"15_CR8","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/SURV.2009.090208","volume":"11","author":"M Al-Kuwaiti","year":"2009","unstructured":"Al-Kuwaiti, M., Kyriakopoulos, N., Hussein, S.: A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability. IEEE Commun. Surv. Tutorials 11(2), 106\u2013124 (2009)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Bohli, J.M., Sorge, C., Ugus, O.: A privacy model for smart metering. In: 2010 IEEE International Conference on Communications Workshops (ICC), pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/ICCW.2010.5503916"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop On Embedded Sensing Systems For Energy-efficiency in Building, pp. 61\u201366. ACM (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies","author":"M Jawurek","year":"2011","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192\u2013210. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-22263-4_11"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992). \nhttps:\/\/doi.org\/10.1007\/3-540-46766-1_9"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"LeMay, M., Gross, G., Gunter, C.A., Garg, S.: Unified architecture for large-scale attested metering. In: 2007 40th Annual Hawaii International Conference on System Sciences, HICSS 2007, pp. 115\u2013115. IEEE (2007)","DOI":"10.1109\/HICSS.2007.586"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Kalogridis, G., Efthymiou, C., Denic, S.Z., Lewis, T.A., Cepeda, R.: Privacy for smart meters: Towards undetectable appliance load signatures. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 232\u2013237. IEEE (2010)","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 238\u2013243. IEEE (2010)","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"15_CR16","first-page":"B1","volume":"18","author":"R Petrlic","year":"2010","unstructured":"Petrlic, R.: A privacy-preserving concept for smart grids. Sicherheit in vernetzten Systemen 18, B1\u2013B14 (2010)","journal-title":"Sicherheit in vernetzten Systemen"},{"issue":"7","key":"15_CR17","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.1016\/j.comnet.2013.02.018","volume":"57","author":"C Rottondi","year":"2013","unstructured":"Rottondi, C., Verticale, G., Capone, A.: Privacy-preserving smart metering with multiple data consumers. Comput. Netw. 57(7), 1699\u20131713 (2013)","journal-title":"Comput. Netw."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 327\u2013332 (2010)","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-642-31284-7_32","volume-title":"Applied Cryptography and Network Security","author":"H-Y Lin","year":"2012","unstructured":"Lin, H.-Y., Tzeng, W.-G., Shen, S.-T., Lin, B.-S.P.: A practical smart metering system supporting privacy preserving billing and load monitoring. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 544\u2013560. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31284-7_32"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71368-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T22:32:55Z","timestamp":1517437975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71368-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319713670","9783319713687"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71368-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}