{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T14:27:38Z","timestamp":1651156058810},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T00:00:00Z","timestamp":1474848000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Austrian Federal Ministry of Science, Research and Economy"},{"name":"Austrian National Foundation for Research, Technology and Development"},{"name":"Federal State of Salzburg"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13635-016-0044-1","type":"journal-article","created":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T12:45:57Z","timestamp":1474893957000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-preserving load profile matching for tariff decisions in smart grids"],"prefix":"10.1186","volume":"2016","author":[{"given":"Andreas","family":"Unterweger","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabian","family":"Knirsch","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G\u00fcnther","family":"Eibl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,9,26]]},"reference":[{"key":"44_CR1","unstructured":"L Karg, K Kleine-Hegermann, M Wedler, C Jahn, E-Energy Abschlussbericht \u2013 Ergebnisse und Erkenntnisse aus der Evaluation der sechs Leuchtturmprojekte. Technical report, Bundesministerium f\u00fcr Wirtschaft und Technologie (German Federal Ministry for Economy and Technology). German (2014). http:\/\/www.digitale-technologien.de\/DT\/Redaktion\/DE\/Downloads\/ab-gesamt-begleitforschung.pdf?_blob . publicationFile\\&v=4. Accessed 16 Aug 2016."},{"issue":"1","key":"44_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2010.40","volume":"8","author":"M Lisovich","year":"2010","unstructured":"M Lisovich, D Mulligan, S Wicker, Inferring personal information from demand-response systems. IEEE Secur. Priv.8(1), 11\u201320 (2010).","journal-title":"IEEE Secur. Priv."},{"key":"44_CR3","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.enpol.2011.11.049","volume":"41","author":"E McKenna","year":"2012","unstructured":"E McKenna, I Richardson, M Thomson, Smart meter data: balancing consumer privacy concerns with legitimate applications. Energy Policy. 41:, 807\u2013814 (2012).","journal-title":"Energy Policy"},{"issue":"3","key":"44_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2009.76","volume":"7","author":"P McDaniel","year":"2009","unstructured":"P McDaniel, S McLaughlin, Security and privacy challenges in the smart grid. IEEE Secur. Priv. Mag.7(3), 75\u201377 (2009).","journal-title":"IEEE Secur. Priv. Mag."},{"issue":"2","key":"44_CR5","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/TSG.2014.2376613","volume":"6","author":"G Eibl","year":"2015","unstructured":"G Eibl, D Engel, Influence of data granularity on smart meter privacy. IEEE Trans. Smart Grid. 6(2), 930\u2013939 (2015).","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"44_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2012.2230221","volume":"30","author":"SD Rane","year":"2013","unstructured":"SD Rane, P Boufounos, Privacy-preserving nearest neighbor methods: comparing signals without revealing them. IEEE Signal Process. Mag.30(2), 18\u201328 (2013).","journal-title":"IEEE Signal Process. Mag."},{"key":"44_CR7","first-page":"20","volume-title":"ACM Symposium on Theory of Computing","author":"J Kilian","year":"1988","unstructured":"J Kilian, in ACM Symposium on Theory of Computing. Founding cryptography on oblivious transfer (ACMChicago, 1988), pp. 20\u201331."},{"issue":"4","key":"44_CR8","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s00778-006-0010-5","volume":"15","author":"S Mukherjee","year":"2006","unstructured":"S Mukherjee, Z Chen, A Gangopadhyay, A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms. VLDB J.15(4), 293\u2013315 (2006).","journal-title":"VLDB J."},{"key":"44_CR9","unstructured":"P Ravikumar, WW Cohen, SE Fienberg, in International Conference on Data Mining (ICDM). A secure protocol for computing string distance metrics, (2004), pp. 40\u201346."},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"WK Wong, DW-L Cheung, B Kao, N Mamoulis, in Proceedings of the 35th SIGMOD International Conference on Management of Data. Secure kNN computation on encrypted databases categories and subject descriptors (ACM, 2009), pp. 139\u2013152.","DOI":"10.1145\/1559845.1559862"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"PT Boufounos, S Rane, in 2013 Data Compression Conference (DCC). Efficient coding of signal distances using universal quantized embeddings (IEEE, 2013), pp. 251\u2013260.","DOI":"10.1109\/DCC.2013.33"},{"key":"44_CR12","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-662-48051-9_15","volume":"8976","author":"JH Cheon","year":"2015","unstructured":"JH Cheon, M Kim, K Lauter, Homomorphic computation of edit distance. Lect. Notes Comput. Sci.8976:, 194\u2013212 (2015).","journal-title":"Lect. Notes Comput. Sci."},{"issue":"3","key":"44_CR13","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z Erkin","year":"2012","unstructured":"Z Erkin, T Veugen, T Toft, RL Lagendijk, Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Secur.7(3), 1053\u20131066 (2012).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"SD Rane, W Sun, A Vetro, in 2009 16th IEEE International Conference on Image Processing (ICIP). Secure distortion computation among untrusting parties using homomorphic encryption (IEEE, 2009), pp. 1485\u20131488.","DOI":"10.1109\/ICIP.2009.5414544"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, D Fiore, R Lazzeretti, V Piuri, A Piva, F Scotti, in IEEE 4th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2010. A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates (IEEE, 2010), pp. 1\u20137.","DOI":"10.1109\/BTAS.2010.5634527"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"A-R Sadeghi, T Schneider, I Wehrenberg, in Information, Security and Cryptology ICISC 2009. Lecture Notes in Computer Science, 5984, ed. by D Lee, Hong S. Efficient privacy-preserving face recognition (SpringerBerlin, Heidelberg, 2010), pp. 229\u2013244.","DOI":"10.1007\/978-3-642-14423-3_16"},{"key":"44_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10433-6_1","volume":"5888","author":"V Kolesnikov","year":"2009","unstructured":"V Kolesnikov, AR Sadeghi, T Schneider, Improved garbled circuit building blocks and applications to auctions and computing minima. Lect. Notes Comput. Sci.5888:, 1\u201320 (2009).","journal-title":"Lect. Notes Comput. Sci."},{"key":"44_CR18","first-page":"162","volume-title":"27th Annual Symposium on Foundations of Computer Science","author":"AC-C Yao","year":"1986","unstructured":"AC-C Yao, in 27th Annual Symposium on Foundations of Computer Science. How to generate and exchange secrets (IEEE Computer SocietyWashington, DC, 1986), pp. 162\u2013167."},{"key":"44_CR19","volume-title":"Provable Security for Public Key Schemes","author":"D Catalano","year":"2005","unstructured":"D Catalano, R Cramer, G DiCrescenzo, I Darmgard, T Takagi, D Pointcheval, Provable Security for Public Key Schemes (Birkh\u00e4user Verlag, Basel, 2005)."},{"issue":"3","key":"44_CR20","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/TII.2011.2158841","volume":"7","author":"P Palensky","year":"2011","unstructured":"P Palensky, D Dietrich, Demand side management: demand response, intelligent energy systems, and Smart loads. IEEE Trans. Ind. Inform.7(3), 381\u2013388 (2011).","journal-title":"IEEE Trans. Ind. Inform."},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"S Caron, G Kesidis, in 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm). Incentive-based energy consumption scheduling algorithms for the smart grid (IEEE, 2010), pp. 391\u2013396.","DOI":"10.1109\/SMARTGRID.2010.5622073"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"S Shao, T Zhang, M Pipattanasomporn, S Rahman, in 2010 IEEE PES Transmission and Distribution Conference and Exposition: Smart Solutions for a Changing World. Impact of TOU rates on distribution load shapes in a smart grid with PHEV penetration (IEEE, 2010), pp. 1\u20136.","DOI":"10.1109\/TDC.2010.5484336"},{"key":"44_CR23","first-page":"5","volume-title":"The 10th International Conference on Autonomous Agents and Multiagent Systems. AAMAS \u201911","author":"S Ramchurn","year":"2011","unstructured":"S Ramchurn, P Vytelingum, A Rogers, N Jennings, in The 10th International Conference on Autonomous Agents and Multiagent Systems. AAMAS \u201911, 1. Agent-based control for decentralised demand side management in the smart grid (International Foundation for Autonomous Agents and Multiagent SystemsTaipei, 2011), pp. 5\u201312. http:\/\/eprints.soton.ac.uk\/271985\/ ."},{"issue":"3","key":"44_CR24","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TSG.2010.2089069","volume":"1","author":"A-H Mohsenian-Rad","year":"2010","unstructured":"A-H Mohsenian-Rad, VWS Wong, J Jatskevich, R Schober, A Leon-Garcia, Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid. IEEE Trans. Smart Grid. 1(3), 320\u2013331 (2010).","journal-title":"IEEE Trans. Smart Grid"},{"key":"44_CR25","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-13013-7_9","volume-title":"Public Key Cryptography PKC 2010. Lecture Notes in Computer Science","author":"R Gennaro","year":"2010","unstructured":"R Gennaro, J Katz, H Krawczyk, T Rabin, in Public Key Cryptography PKC 2010. Lecture Notes in Computer Science, 6056, ed. by D Pointcheval, PQ Nguyen. Secure network coding over the integers (SpringerBerlin, Heidelberg, 2010), pp. 142\u2013160."},{"key":"44_CR26","first-page":"844","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201914","author":"D Fiore","year":"2014","unstructured":"D Fiore, R Gennaro, V Pastro, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201914. Efficiently Verifiable Computation on encrypted data (ACMScottsdale, 2014), pp. 844\u2013855."},{"issue":"6","key":"44_CR27","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"W Diffie, M Hellman, New directions in cryptography. IEEE Trans. Inf. Theory. 22(6), 644\u2013654 (1976).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"44_CR28","unstructured":"ITU-T. Recommendation ITU-T X.509\u2014Information technology\u2014Open Systems Interconnection\u2014The Directory: Public key and attribute certificate frameworks, (2012)."},{"key":"44_CR29","unstructured":"National Institute of Standards and Technology (NIST). Specification for the Advanced Encryption Standard (AES), (2001)."},{"key":"44_CR30","doi-asserted-by":"crossref","unstructured":"P Boufounos, S Rane, in IEEE International Workshop on Information Forensics and Security. Secure binary embeddings for privacy preserving nearest neighbors, (2011).","DOI":"10.1109\/WIFS.2011.6123149"},{"key":"44_CR31","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2219653","volume":"30","author":"R Lagendijk","year":"2013","unstructured":"R Lagendijk, Z Erkin, M Barni, Encrypted signal processing for privacy protection. IEEE Signal Process. Mag.30:, 82\u2013105 (2013).","journal-title":"IEEE Signal Process. Mag."},{"key":"44_CR32","doi-asserted-by":"crossref","unstructured":"P Paillier, in Proceedings of Eurocrypt \u201999, Advances in Cryptology. Lecture Notes in Computer Science, 1592, ed. by J.\u02dcStern. Public-key cryptosystems based on composite degree residuosity classes (SpringerPrague, 1999), pp. 223\u2013238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"44_CR33","unstructured":"National Institute of Standards and Technology (NIST). NIST 800-57: computer security. NIST, (2012)."},{"issue":"2","key":"44_CR34","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TSG.2014.2364686","volume":"6","author":"A Unterweger","year":"2015","unstructured":"A Unterweger, D Engel, Resumable load data compression in smart grids. IEEE Trans. Smart Grid. 6(2), 919\u2013929 (2015).","journal-title":"IEEE Trans. Smart Grid"},{"key":"44_CR35","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1109\/TPWRS.2009.2030426","volume":"25","author":"Y Chen","year":"2010","unstructured":"Y Chen, PB Luh, C Guan, Y Zhao, LD Michel, MA Coolbeth, PB Friedland, SJ Rourke, Short-term load forecasting: similar day-based wavelet neural networks. IEEE Trans. Power Syst.25:, 322\u2013330 (2010).","journal-title":"IEEE Trans. Power Syst."},{"key":"44_CR36","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TPWRS.2012.2197639","volume":"28","author":"C Guan","year":"2013","unstructured":"C Guan, PB Luh, LD Michel, Y Wang, PB Friedland, Very short-term load forecasting: wavelet neural networks with data pre-filtering. IEEE Trans. Power Syst.28:, 30\u201341 (2013).","journal-title":"IEEE Trans. Power Syst."},{"key":"44_CR37","unstructured":"E-Control, Sonstige Marktregeln Strom \u2013 Kapitel 6: Z\u00e4hlwerte, Datenformate und standardisierte Lastprofile. E-Control, Vienna, Austria (2011). https:\/\/www.e-control.at\/recht\/marktregeln\/sonstige-marktregeln-strom . Accessed 16 Aug 2016."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-016-0044-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-016-0044-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-016-0044-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T00:48:03Z","timestamp":1568422083000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-016-0044-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,26]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["44"],"URL":"https:\/\/doi.org\/10.1186\/s13635-016-0044-1","relation":{},"ISSN":["1687-417X"],"issn-type":[{"value":"1687-417X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,26]]},"article-number":"21"}}