{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:55:44Z","timestamp":1742990144323,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642312830"},{"type":"electronic","value":"9783642312847"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31284-7_32","type":"book-chapter","created":{"date-parts":[[2012,6,13]],"date-time":"2012-06-13T10:15:58Z","timestamp":1339582558000},"page":"544-560","source":"Crossref","is-referenced-by-count":32,"title":["A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring"],"prefix":"10.1007","author":[{"given":"Hsiao-Ying","family":"Lin","sequence":"first","affiliation":[]},{"given":"Wen-Guey","family":"Tzeng","sequence":"additional","affiliation":[]},{"given":"Shiuan-Tzuo","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Bao-Shuh P.","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Ontario energy board, smart meters and time of use (tou) prices, webpage available at http:\/\/www.ontarioenergyboard.ca\/OEB\/Consumers\/Electricity\/Smart+Meters"},{"key":"32_CR2","unstructured":"Smart grid cyber security strategy and requirements. National Institute of Standards and Technology (U.S.) Interagency Reports, DRAFT-NISTIR-7628 (2009)"},{"key":"32_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-24178-9_9","volume-title":"Information Hiding","author":"G. \u00c1cs","year":"2011","unstructured":"\u00c1cs, G., Castelluccia, C.: I Have a DREAM (DiffeRentially privatE smArt Metering). In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol.\u00a06958, pp. 118\u2013132. Springer, Heidelberg (2011)"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Bohli, J.M., Sorge, C., Ugus, O.: A privacy model for smart metering. In: Proceedings of the 1st IEEE International Workshop on Smart Grid Communications (2010)","DOI":"10.1109\/ICCW.2010.5503916"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Chan, T.H.H., Shi, E., Song, D.: Privacy preserving stream aggregation with fault tolerance. In: Proceedings of the 16th International Conference on Financial Cryptography and Data Security - FC 2012. LNCS. Springer (2012)","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management","author":"F.D. Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-Friendly Energy-Metering via Homomorphic Encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 226\u2013238. Springer, Heidelberg (2011)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Hart, G.W.: Nonintrusive appliance load monitoring. In: Proceedings of the IEEE, pp. 1870\u20131891. IEEE Press (1992)","DOI":"10.1109\/5.192069"},{"key":"32_CR8","unstructured":"Inc., A.P.L.S.: Aclara ami industry glossary (2008)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. Computing Research Repository - CoRR (2010)","DOI":"10.1007\/978-3-642-22263-4_11"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-22263-4_10","volume-title":"Privacy Enhancing Technologies","author":"K. Kursawe","year":"2011","unstructured":"Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-Friendly Aggregation for the Smart-Grid. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 175\u2013191. Springer, Heidelberg (2011)"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPAE.2003.1192027","volume":"1","author":"C. Laughman","year":"2003","unstructured":"Laughman, C., Lee, K., Cox, R., Shaw, S., Leeb, S., Norford, L., Armstrong, P.: Power signature analysis. IEEE Power and Energy Magazine\u00a01, 56\u201363 (2003)","journal-title":"IEEE Power and Energy Magazine"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"LeMay, M., Gross, G., Gunter, C.A., Garg, S.: Unified architecture for large-scale attested metering. In: Proceedings of the 40th Hawaii International International Conference on Systems Science - HICSS 2007, p. 115. IEEE Computer Society (2007)","DOI":"10.1109\/HICSS.2007.586"},{"issue":"1","key":"32_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TSG.2010.2046347","volume":"1","author":"A.R. Metke","year":"2010","unstructured":"Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Transactions on Smart Grid\u00a01(1), 99\u2013107 (2010)","journal-title":"IEEE Transactions on Smart Grid"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building - BuildSys 2010, pp. 61\u201366. ACM (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"32_CR15","unstructured":"Petrlic, R.: A privacy preserving concept for smart grids. In: Sicherheit in vernetzten Systemen: 18. DFN Workshop, pp. B1\u2013B14. Books on Demand GmbH (2010)"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. Microsoft Technical Report, MSR-TR-2010-150 (2010)","DOI":"10.1145\/2046556.2046564"},{"key":"32_CR17","unstructured":"Shi, E., Chan, T.H.H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Proceedings of the 18th Annual Network and Distributed System Security - NDSS 2011. The Internet Society (2011)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31284-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T21:15:35Z","timestamp":1642454135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31284-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312830","9783642312847"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31284-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}