{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:49:31Z","timestamp":1743040171562,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_9","type":"book-chapter","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T22:55:47Z","timestamp":1354229747000},"page":"93-107","source":"Crossref","is-referenced-by-count":9,"title":["V2GPriv: Vehicle-to-Grid Privacy in the Smart Grid"],"prefix":"10.1007","author":[{"given":"Mark","family":"Stegelmann","sequence":"first","affiliation":[]},{"given":"Dogan","family":"Kesdogan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"9_CR1","doi-asserted-by":"publisher","first-page":"4379","DOI":"10.1016\/j.enpol.2009.05.053","volume":"37","author":"C. Guille","year":"2009","unstructured":"Guille, C., Gross, G.: A conceptual framework for the vehicle-to-grid (V2G) implementation. Energy Policy\u00a037(11), 4379\u20134390 (2009)","journal-title":"Energy Policy"},{"issue":"3","key":"9_CR2","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/S1361-9209(97)00001-1","volume":"2","author":"W. Kempton","year":"1997","unstructured":"Kempton, W., Letendre, S.E.: Electric vehicles as a new power source for electric utilities. Transportation Research Part D: Transport and Environment\u00a02(3), 157\u2013175 (1997)","journal-title":"Transportation Research Part D: Transport and Environment"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2010.40","volume":"8","author":"M.A. Lisovich","year":"2010","unstructured":"Lisovich, M.A., Mulligan, D.K., Wicker, S.B.: Inferring personal information from demand-response systems. IEEE Security and Privacy\u00a08, 11\u201320 (2010)","journal-title":"IEEE Security and Privacy"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-29804-2_5","volume-title":"Public Key Infrastructures, Services and Applications","author":"M. Stegelmann","year":"2012","unstructured":"Stegelmann, M., Kesdogan, D.: Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid Interaction. In: Petkova-Nikova, S., Pashalidis, A., Pernul, G. (eds.) EuroPKI 2011. LNCS, vol.\u00a07163, pp. 75\u201390. Springer, Heidelberg (2012)"},{"key":"9_CR5","unstructured":"Kreutzmann, H., Vollmer, S., Tekampe, N., Abromeit, A.: Protection Profile for the Gateway of a Smart Metering System (Gateway PP). Federal Office for Information Security Germany, Protection Profile 01.01.01 (final draft) (August 2011)"},{"issue":"4","key":"9_CR6","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/TSG.2011.2140343","volume":"2","author":"Z. Yang","year":"2011","unstructured":"Yang, Z., Yu, S., Lou, W., Liu, C.: P2: Privacy-preserving communication and precise reward architecture for V2G networks in smart grid. IEEE Transactions on Smart Grid\u00a02(4), 697\u2013706 (2011)","journal-title":"IEEE Transactions on Smart Grid"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.jpowsour.2004.12.022","volume":"144","author":"W. Kempton","year":"2005","unstructured":"Kempton, W., Tomic, J.: Vehicle-to-grid power implementation: From stabilizing the grid to supporting large-scale renewable energy. Journal of Power Sources\u00a0144(1), 280\u2013294 (2005)","journal-title":"Journal of Power Sources"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Stegelmann, M., Kesdogan, D.: Location Privacy for Vehicle-to-Grid Interaction through Battery Management. In: ITNG 2012. IEEE Computer Society (2012)","DOI":"10.1109\/ITNG.2012.93"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: IEEE SmartGridComm 2010, pp. 238\u2013243. IEEE (October 2010)","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Johns, M., Rieck, K.: Smart metering de-pseudonymization. In: 27th Annual Computer Security Applications Conference (ACSAC). ACM (2011)","DOI":"10.1145\/2076732.2076764"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Stegelmann, M., Kesdogan, D.: GridPriv: A smart metering architecture offering k-anonymity. In: IEEE TrustCom 2012. IEEE Computer Society (2012)","DOI":"10.1109\/TrustCom.2012.170"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1878431.1878446","volume-title":"2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building","author":"A. Molina-Markham","year":"2010","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61\u201366. ACM, New York (2010)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management","author":"F.D. Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-Friendly Energy-Metering via Homomorphic Encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 226\u2013238. Springer, Heidelberg (2011)"},{"key":"9_CR14","volume-title":"Proceedings of the 40th Annual Hawaii International Conference on System Sciences, HICSS 2007","author":"M. LeMay","year":"2007","unstructured":"LeMay, M., Gross, G., Gunter, C.A., Garg, S.: Unified architecture for large-scale attested metering. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, HICSS 2007. IEEE Computer Society, Washington, DC (2007)"},{"key":"9_CR15","first-page":"49","volume-title":"Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011","author":"A. Rial","year":"2011","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2011, pp. 49\u201360. ACM, New York (2011)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Kalogridis, G., Efthymiou, C., Denic, S., Lewis, T., Cepeda, R.: Privacy for smart meters: Towards undetectable appliance load signatures. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 232\u2013237 (October 2010)","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"9_CR17","unstructured":"Korff, D.: Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments - A.4 Germany. European Commision - Directorate-General Justice, Freedom and Security, Country report (May 2010)"},{"key":"9_CR18","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, v0.34 (August 2010), http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf"},{"issue":"2","key":"9_CR19","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Commun. ACM"},{"key":"9_CR20","unstructured":"Mao, W.: Modern Cryptography: Theory and Practice, 1st edn. Prentice Hall PTR (August 2003)"},{"key":"9_CR21","unstructured":"TR-03109 Anforderungen an die Interoperabilit\u00e4t der Kommunikationseinheit eines intelligenten Messsystems f\u00fcr Stoff- und Energiemengen. Federal Office for Information Security Germany, Technical Guideline 0.20 (October 2011) (in German)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T20:06:54Z","timestamp":1576181214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}