{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:13:46Z","timestamp":1745468026757,"version":"3.40.4"},"publisher-location":"Wiesbaden","reference-count":25,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658003326"},{"type":"electronic","value":"9783658003333"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-658-00333-3_11","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T06:34:49Z","timestamp":1355121289000},"page":"105-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Smart Metering"],"prefix":"10.1007","author":[{"given":"Alfredo","family":"Rial","sequence":"first","affiliation":[]},{"given":"George","family":"Danezis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,11]]},"reference":[{"key":"11_CR1","unstructured":"Ross Anderson and Shailendra Fuloria. On the security economics of electricity metering. In The Ninth Workshop on the Economics of Information Security, 2010."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Mihhail Aizatulin, Andrew D. Gordon, and Jan Jrjens. Extracting and verifying cryptographic models from c protocol code by symbolic execution. 2011.","DOI":"10.1145\/2046707.2046745"},{"key":"11_CR3","unstructured":"Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, and Christophe Geuens. Pretp: Privacy- preserving electronic toll pricing. In 19th Usenix Security Symposium, August 2010."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Ann Cavoukian, Jules Polonetsky, and Christopher Wolf. Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. In Identity in the Information Society, 2009.","DOI":"10.1007\/s12394-010-0046-y"},{"key":"11_CR5","volume-title":"Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science","author":"Camenisch J","year":"1997","unstructured":"J. Camenisch and M. Stadler. Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH Zurich, March 1997."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Colette Cuijpers. No to mandatory smart metering does not equal privacy! [dJJ08] W. de Jonge and B. Jacobs. Privacy-friendly electronic traffic pricing via commits. In P. Degano, J. Guttman, and F. Martinelli, editors, Formal Aspects in Security and Trust, volume 5491 of LNCS, pages 143-161.Springer, 2008.","DOI":"10.1007\/978-3-642-01465-9_10"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"George Danezis, Markulf Kohlweiss, and Alfredo Rial. Differentially private billing with rebates. Information Hiding, 2011.","DOI":"10.1007\/978-3-642-24178-9_11"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Costas Efthymiou and Georgios Kalogridis. Smart grid privacy via anonymization of smart metering data. In First IEEE International Conference on Smart Grid Communications. IEEE, October, 4-6 2010.","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Omid Fatemieh, Ranveer Chandra, and Carl A. Gunter. Low cost and secure smart meter communications using the tv white spaces. ISRCS \u201810: IEEE International Symposium on Resilient Control Systems, August. 2010.","DOI":"10.1109\/ISRCS.2010.5602162"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Flavio D. Garcia and Bart Jacobs. Privacy-friendly energy-metering via homomorphic encryption. Technical report, Radboud Universiteit Nijmegen, February 2010.","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Amir hamed Mohsenian-rad, Vincent W. S. Wong, Juri Jatskevich, and Robert Schober. 1 optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid.","DOI":"10.1109\/ISGT.2010.5434752"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"George W. Hart. Nonintrusive appliance load monitoring. In Proceedings of the IEEE, pages 1870{1891, December 1992.","DOI":"10.1109\/5.192069"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Marek Jawurek, Martin Johns, and Florian Kerschbaum. Plug-in privacy for smart metering billing. CoRR, abs\/1012.2248, 2010.","DOI":"10.1007\/978-3-642-22263-4_11"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"K. Kursawe, M. Kohlweiss, and G. Danezis. Privacy-friendly aggregation for the smart-grid. Privacy Enhancing Technologies, 2011.","DOI":"10.1007\/978-3-642-22263-4_10"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Michael LeMay, George Gross, Carl A. Gunter, and Sanjam Garg. Unified architecture for largescale attested metering. In Hawaii International Conference on System Sciences, Big Island, Hawaii, January 2007.ACM.","DOI":"10.1109\/HICSS.2007.586"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"C. Laughman, Kwangduk Lee, R. Cox, S. Shaw, S. Leeb, L. Norford, and P. Armstrong. Power signature analysis. Power and Energy Magazine, IEEE, (2):56-63.","DOI":"10.1109\/MPAE.2003.1192027"},{"key":"11_CR17","unstructured":"Mikhail Lisovich and Stephen Wicker. Privacy concerns in upcoming residential and commercial demand-response systems. In 2008 Clemson University Power Systems Conference. Clemson University, March 2008."},{"key":"11_CR18","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"McDaniel Patrick","year":"2009","unstructured":"Patrick McDaniel and Stephen McLaughlin. Security and privacy challenges in the smart grid. IEEE Security and Privacy, 7:75-77, 2009.","journal-title":"IEEE Security and Privacy"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Stephen McLaughlin, Patrick McDaniel, and Dmitry Podkuiko. Energy theft in the advanced metering infrastructure. In 4th International Workshop on Critical Information Infraestructures Security, 2009.","DOI":"10.1007\/978-3-642-14379-3_15"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Andres Molina-Markham, Prashant Shenoy, Kevin Fu, Emmanuel Cecchet, and David Irwin. Private memoirs of a smart meter. In BuildSys\u201910. ACM, 2010.","DOI":"10.1145\/1878431.1878446"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Elias L. Quinn. Privacy and the new energy infrastructure. SSRN eLibrary, 2009.","DOI":"10.2139\/ssrn.1370731"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"N. Swamy, J. Chen, C. Fournet, P.Y. Strub, and K.B.J. Yang. Secure distributed programming with value-dependent types. Technical Report MSR-TR-2010-149, Microsoft Research Cambridge, November 2010.","DOI":"10.1145\/2034773.2034811"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Carmela Troncoso, George Danezis, Eleni Kosta, and Bart Preneel. Pripayd: privacy friendly pay-as-you-drive insurance. In Peng Ning and Ting Yu, editors, WPES, pages 99-107. ACM, 2007.","DOI":"10.1145\/1314333.1314353"},{"key":"11_CR24","unstructured":"The Smart Grid Interoperability Panel. Smart Grid Cyber Security Strategy and Requirements. Technical Report 7628, National Institute of Standards and Technology."},{"key":"11_CR25","unstructured":"Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas Harth. Linked data for a privacy- aware smart grid. In INFORMATIK 2010 Workshop - Informatik fr die Energiesysteme der Zukunft, 2010."}],"container-title":["ISSE 2012 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-00333-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T12:54:53Z","timestamp":1745412893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-00333-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783658003326","9783658003333"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-00333-3_11","relation":{},"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"11 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}