{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:07:36Z","timestamp":1776938856292,"version":"3.51.4"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007758","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:42:49Z","timestamp":1421721769000},"page":"872-877","source":"Crossref","is-referenced-by-count":20,"title":["Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Paverd","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Brown","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22263-4_11","article-title":"Plug-in privacy for smart metering billing","author":"jawurek","year":"2011","journal-title":"Proceedings of the 11th International Conference on Privacy Enhancing Technologies"},{"key":"17","article-title":"I have a DREAM!: Differentially private smart metering","author":"cs g a","year":"2011","journal-title":"Proceedings of the 13th International Conference on Information hiding-IH'11"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22263-4_10","article-title":"Privacy-friendly aggregation for the smart-grid","author":"kursawe","year":"2011","journal-title":"Proceedings of the 11th International Conference on Privacy Enhancing technologies-PETS'11"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503916"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.170"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22444-7_15","article-title":"Privacy-friendly energy-metering via homomorphic encryption","author":"garcia","year":"2011","journal-title":"Proceedings of the 6th International Conference on Security and Trust Management"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486013"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.6519618"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24178-9_11","article-title":"Differentially private billing with rebates","author":"danezis","year":"2011","journal-title":"Proceedings of the 13th International Conference on Information hiding-IH'11"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1007\/11787006_1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming Ser Lecture Notes in Computer Science"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622063"},{"key":"24","article-title":"A privacy-preserving Concept for Smart Grids","author":"petrlic","year":"2010","journal-title":"Sicherheit in Vernetzten Systemen 18 DFN Workshop"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1007\/11681878_14","article-title":"Calibrating noise to sensitivity in private data analysis","volume":"3876","author":"dwork","year":"2006","journal-title":"Theory of Cryptography Ser Lecture Notes in Computer Science"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36883-7_7","article-title":"Set difference attacks in wireless sensor networks","volume":"106","author":"de souza","year":"2013","journal-title":"Security and Privacy in Communication Networks Ser Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_17"},{"key":"3","article-title":"Benefits of demand reponse in electricity markets and recommendations for achieving them","year":"2006","journal-title":"Tech Rep"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10329-7_1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5170-5_12"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6687994"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38030-3_6"},{"key":"5","year":"2013","journal-title":"Energy Interoperation Version 1 0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2008.04.002"},{"key":"9","article-title":"Modelling and automatically analysing privacy properties for honest-but-curious adversaries","author":"paverd","year":"2014","journal-title":"Tech Rep"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076764"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","location":"Venice, Italy","start":{"date-parts":[[2014,11,3]]},"end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007758.pdf?arnumber=7007758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T21:40:56Z","timestamp":1566250856000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007758","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}