{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:29:13Z","timestamp":1761676153211,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_13","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"194-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Differentially Private Smart Metering with Battery Recharging"],"prefix":"10.1007","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sebastian","family":"Meiser","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"13_CR1","unstructured":"Energy Independence and Security Act of 2007. One Hundred Tenth Congress of the United States of America (2007)"},{"key":"13_CR2","unstructured":"Directive 2009\/72\/EC of the European Parliament and of the Council. Official Journal of the European Union (2009)"},{"key":"13_CR3","series-title":"LNCS","first-page":"118","volume-title":"IH 2011","author":"G \u00c1cs","year":"2011","unstructured":"\u00c1cs, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118\u2013132. Springer, Heidelberg (2011)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Acs, G., Castelluccia, C., Lecat, W.: Protecting against physical resource monitoring. In: Proceedings of 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES), pp. 23\u201332. ACM (2011)","DOI":"10.1145\/2046556.2046560"},{"key":"13_CR5","unstructured":"Anderson, R., Fuloria, S.: On the security economics of electricity metering. In: Workshop on the Economics of Information Security (WEIS) (2010)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Anderson, R., Fuloria, S.: Who controls the off switch? In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 96\u2013101. IEEE Press (2010)","DOI":"10.1109\/SMARTGRID.2010.5622026"},{"key":"13_CR7","unstructured":"Backes, M., Meiser, S.: Differentially private smart metering with battery recharging. Technical report, Saarland University. http:\/\/eprint.iacr.org\/2012\/183 (Online)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Baranski, M., Voss, J.: Detecting patterns of appliances from total load data using a dynamic programming approach. In: Proceedings of the 4th IEEE International Conference on Data Mining (ICDM), pp. 327\u2013330. IEEE Press (2004)","DOI":"10.1109\/ICDM.2004.10003"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s12394-010-0046-y","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Polonetsky, J., Wolf, C.: Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity Inf. Soc. 3, 275\u2013294 (2010)","journal-title":"Identity Inf. Soc."},{"key":"13_CR10","unstructured":"Cuijpers, C.: No to mandatory smart metering: does not equal privacy. http:\/\/vortex.uvt.nl\/TILTblog\/?p=54 (Online)"},{"key":"13_CR11","series-title":"LNCS","first-page":"148","volume-title":"IH 2011","author":"G Danezis","year":"2011","unstructured":"Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 148\u2013162. Springer, Heidelberg (2011)"},{"key":"13_CR12","series-title":"LNCS","first-page":"1","volume-title":"ICALP 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"13_CR13","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486\u2013503. Springer, Heidelberg (2006)"},{"key":"13_CR14","series-title":"LNCS","first-page":"226","volume-title":"STM 2010","author":"FD Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 226\u2013238. Springer, Heidelberg (2011)"},{"key":"13_CR15","unstructured":"Greveler, U., Justus, B., Loehr, D.: Hintergrund und experimentelle Ergebnisse zum Thema Smart Meter und Datenschutz. Technical report, Fachhochschule M\u00fcnster (2011)"},{"issue":"12","key":"13_CR16","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/5.192069","volume":"80","author":"G Hart","year":"1992","unstructured":"Hart, G.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870\u20131891 (1992)","journal-title":"Proc. IEEE"},{"key":"13_CR17","series-title":"LNCS","first-page":"405","volume-title":"ICALP 2010","author":"T-H Hubert Chan","year":"2010","unstructured":"Hubert Chan, T.-H., Shi, E., Song, D.: Private and continual release of statistics. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6199, pp. 405\u2013417. Springer, Heidelberg (2010)"},{"key":"13_CR18","series-title":"LNCS","first-page":"175","volume-title":"PETS 2011","author":"K Kursawe","year":"2011","unstructured":"Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 175\u2013191. Springer, Heidelberg (2011)"},{"issue":"2","key":"13_CR19","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TCE.2007.381742","volume":"53","author":"H Lam","year":"2007","unstructured":"Lam, H., Fung, G., Lee, W.: A novel method to construct taxonomy electrical appliances based on load signatures. IEEE Trans. Consum. Electron. 53(2), 653\u2013660 (2007)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"2","key":"13_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPAE.2003.1192027","volume":"1","author":"C Laughman","year":"2003","unstructured":"Laughman, C., Lee, K., Cox, R., Shaw, S., Leeb, S., Norford, L., Armstrong, P.: Power signature analysis. IEEE Power Energy Mag. 1(2), 56\u201363 (2003)","journal-title":"IEEE Power Energy Mag."},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"McLaughlin, S., McDaniel, P., Aiello, W.: Protecting consumer privacy from electric load monitoring. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 87\u201398. ACM (2011)","DOI":"10.1145\/2046707.2046720"},{"key":"13_CR22","unstructured":"Merritt, R.: Stimulus: DoE readies $$\\$ 4.3$$ billion for smart grid. EE Times (2009)"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building (BuildSys), pp. 61\u201366. ACM (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"13_CR24","unstructured":"T. S. G. I. Panel. Cyber security strategy and requirements. Technical report 7628, National Institute of Standards and Technology"},{"key":"13_CR25","first-page":"1995","volume":"09","author":"EL Quinn","year":"2009","unstructured":"Quinn, E.L.: Privacy and the new energy infrastructure. Soc. Sci. Res. Netw. 09, 1995\u20132008 (2009)","journal-title":"Soc. Sci. Res. Netw."},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 International Conference on Management of Data (SIGMOD), pp. 735\u2013746. ACM (2010)","DOI":"10.1145\/1807167.1807247"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES), pp. 49\u201360. ACM (2011)","DOI":"10.1145\/2046556.2046564"},{"key":"13_CR28","unstructured":"Shi, E., Chan, T.-H.H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Proceedings of the 18th Annual Network & Distributed System Security Symposium (NDSS) (2011)"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Varodayan, D., Khisti, A.: Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2011)","DOI":"10.1109\/ICASSP.2011.5946886"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:30:30Z","timestamp":1746156630000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}