{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:41:43Z","timestamp":1759333303626},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T00:00:00Z","timestamp":1489968000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Austrian Federal Ministry of Science, Research and Economy and the Austrian National Foundation for Research, Technology and Development"},{"name":"Federal State of Salzburg"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13635-017-0058-3","type":"journal-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T13:35:24Z","timestamp":1490016924000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Multi-resolution privacy-enhancing technologies for smart metering"],"prefix":"10.1186","volume":"2017","author":[{"given":"Fabian","family":"Knirsch","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G\u00fcnther","family":"Eibl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,3,20]]},"reference":[{"key":"58_CR1","unstructured":"European Commission (2014). Cost-benefit analyses and state of play of smart metering deployment in the EU-27. Technical report. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52014SC0189%26from=EN ."},{"key":"58_CR2","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.enpol.2011.11.049","volume":"41","author":"E McKenna","year":"2012","unstructured":"McKenna, E, Richardson, I, Thomson, M (2012). Smart meter data: balancing consumer privacy concerns with legitimate applications. Energy Policy, 41, 807\u201314.","journal-title":"Energy Policy"},{"issue":"12","key":"58_CR3","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/5.192069","volume":"80","author":"GW Hart","year":"1992","unstructured":"Hart, GW (1992). Nonintrusive appliance load monitoring. Proc. IEEE, 80(12), 1870\u201391.","journal-title":"Proc. IEEE"},{"key":"58_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1878431.1878446","volume-title":"Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building. BuildSys \u201910","author":"A Molina-Markham","year":"2010","unstructured":"Molina-Markham, A, Shenoy, P, Fu, K, Cecchet, E, Irwin, D (2010). Private memoirs of a smart meter. In Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building. BuildSys \u201910. ACM, New York, (pp. 61\u20136)."},{"issue":"1","key":"58_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2010.40","volume":"8","author":"M Lisovich","year":"2010","unstructured":"Lisovich, M, Mulligan, D, Wicker, S (2010). Inferring personal information from demand-response systems. IEEE Secur. Priv, 8(1), 11\u201320.","journal-title":"IEEE Secur. Priv"},{"key":"58_CR6","first-page":"1","volume-title":"Proceedings of the 6th Conference on Innovative Smart Grid Technologies (ISGT2015)","author":"F Knirsch","year":"2015","unstructured":"Knirsch, F, Engel, D, Frincu, M, Prasanna, V (2015). Model based assessment for balancing privacy requirements and operational capabilities in the smart grid, Innovative smart grid technologies conference (ISGT), 2015 IEEE Power & Energy Society. In Proceedings of the 6th Conference on Innovative Smart Grid Technologies (ISGT2015). IEEE, Washington, (pp. 1\u20135)."},{"key":"58_CR7","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/2600918.2600920","volume-title":"Proceedings of the Second ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec \u201914)","author":"G Eibl","year":"2014","unstructured":"Eibl, G, & Engel, D (2014). Influence of data granularity on nonintrusive appliance load monitoring. In Proceedings of the Second ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec \u201914). ACM, Salzburg, (pp. 147\u201351)."},{"issue":"2","key":"58_CR8","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/TSG.2014.2376613","volume":"6","author":"G Eibl","year":"2015","unstructured":"Eibl, G, & Engel, D (2015). Influence of data granularity on smart meter privacy. IEEE Trans. Smart Grid, 6(2), 930\u20139.","journal-title":"IEEE Trans. Smart Grid"},{"key":"58_CR9","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-22263-4_10","volume-title":"Privacy Enhanced Technology Symposium","author":"K Kursawe","year":"2011","unstructured":"Kursawe, K, Danezis, G, Kohlweiss, M (2011). Privacy-friendly aggregation for the smart grid. In Privacy Enhanced Technology Symposium. Springer, Berlin Heidelberg, (pp. 175\u201391)."},{"issue":"2","key":"58_CR10","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10207-012-0181-6","volume":"12","author":"F Gomez Marmol","year":"2013","unstructured":"Gomez Marmol, F, Sorge, C, Petrlic, R, Ugus, O, Westhoff, D, Martinez Perez, G (2013). Privacy-enhanced architecture for smart metering. Int. J. Inf. Secur, 12(2), 67\u201382.","journal-title":"Int. J. Inf. Secur"},{"key":"58_CR11","first-page":"327","volume-title":"Proceedings of First IEEE International Conference on Smart Grid Communications","author":"F Li","year":"2010","unstructured":"Li, F, Luo, B, Liu, P (2010). Secure Information Aggregation for Smart Grids Using Homomorphic Encryption. In Proceedings of First IEEE International Conference on Smart Grid Communications. IEEE, Gaithersburg, (pp. 327\u2013332)."},{"key":"58_CR12","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/978-3-642-31284-7_33","volume-title":"Proceedings of the 10th International Conference on Applied Cryptography and Network Security. ACNS\u201912","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z, & Tsudik, G (2012). Private computation of spatial and temporal power consumption with smart meters. In Proceedings of the 10th International Conference on Applied Cryptography and Network Security. ACNS\u201912. Springer, Berlin, (pp. 561\u201377)."},{"key":"58_CR13","volume-title":"Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data","author":"V Rastogi","year":"2010","unstructured":"Rastogi, V, & Suman, N (2010). Differentially private aggregation of distributed time-series with transformation and encryption. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. ACM, Conference, Indianapolis."},{"key":"58_CR14","first-page":"148","volume-title":"Differentially private billing with rebates","author":"G Danezis","year":"2011","unstructured":"Danezis, G, Kohlweiss, M, Rial, A. (2011). Differentially private billing with rebates (Vol. 6958 LNCS, pp. 148\u201362). Berlin: Springer."},{"key":"58_CR15","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management. Lecture Notes in Computer Science","author":"F Garcia","year":"2011","unstructured":"Garcia, F, & Jacobs, B (2011). Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J, Lopez, J, Barthe, G, Pretschner, A (Eds.) In Security and Trust Management. Lecture Notes in Computer Science, (Vol. 6710. Springer, Berlin, pp. 226\u201338)."},{"key":"58_CR16","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/SmartGridComm.2012.6486011","volume-title":"Third International Conference on Smart Grid Communications (SmartGridComm) 2012","author":"F Li","year":"2012","unstructured":"Li, F, & Luo, B (2012). Preserving data integrity for smart grid data aggregation. In Third International Conference on Smart Grid Communications (SmartGridComm) 2012. IEEE, Tainan, (pp. 366\u201371)."},{"issue":"2","key":"58_CR17","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.2228343","volume":"30","author":"Z Erkin","year":"2013","unstructured":"Erkin, Z, Troncoso-pastoriza, JR, Lagendijk, RL, Perez-Gonzalez, F (2013). Privacy-preserving data aggregation in smart metering systems: an overview. IEEE Signal Proc. Mag, 30(2), 75\u201386.","journal-title":"IEEE Signal Proc. Mag"},{"key":"58_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/2516930.2516933","volume-title":"Proceedings of the First ACM Workshop on Smart Energy Grid Security. SEGS \u201913","author":"A Biselli","year":"2013","unstructured":"Biselli, A, Franz, E, Coutinho, MP (2013). Protection of consumer data in the smart grid compliant with the German smart metering guideline. In Proceedings of the First ACM Workshop on Smart Energy Grid Security. SEGS \u201913. ACM, New York, (pp. 41\u201352)."},{"key":"58_CR19","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C, McSherry, F, Nissim, K, Smith, A (2006). Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography. Springer, Berlin, (pp. 265\u201384)."},{"key":"58_CR20","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-24178-9_9","volume-title":"Proc. Information Hiding Conference","author":"G Acs","year":"2011","unstructured":"Acs, G, & Castelluccia, C (2011). I have a DREAM! (DiffeRentially privatE smArt Metering). In Proc. Information Hiding Conference. Springer, Berlin Heidelberg, (pp. 118\u2013132)."},{"key":"58_CR21","volume-title":"Proc. NDSS Symposium 2011","author":"E Shi","year":"2011","unstructured":"Shi, E, Chow, R, Chan, THH, Song, D, Rieffel, E (2011). Privacy-preserving aggregation of time-series data. In Proc. NDSS Symposium 2011. Internet Society, San Diego."},{"key":"58_CR22","first-page":"238","volume-title":"Proceedings of First IEEE International Conference on Smart Grid Communications","author":"C Efthymiou","year":"2010","unstructured":"Efthymiou, C, & Kalogridis, G (2010). Smart grid privacy via anonymization of smart metering data. In Proceedings of First IEEE International Conference on Smart Grid Communications. IEEE, Gaithersburg, (pp. 238\u201343)."},{"key":"58_CR23","first-page":"1","volume-title":"Proc. IEEE PES Innovative Smart Grid Technologies (ISGT\u201913)","author":"D Engel","year":"2013","unstructured":"Engel, D (2013). Wavelet-based load profile representation for smart meter privacy. In Proc. IEEE PES Innovative Smart Grid Technologies (ISGT\u201913). IEEE, Washington, (pp. 1\u20136)."},{"key":"58_CR24","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/SmartGridComm.2014.7007767","volume-title":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","author":"CD Peer","year":"2014","unstructured":"Peer, CD, Engel, D, Wicker, SB (2014). Hierarchical key management for multi-resolution load data representation. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, Venice, (pp. 926\u201332)."},{"issue":"99","key":"58_CR25","first-page":"1","volume":"PP","author":"D Engel","year":"2016","unstructured":"Engel, D, & Eibl, G (2016). Wavelet-based multiresolution smart meter privacy. IEEE Trans. Smart Grid, PP(99), 1\u201312.","journal-title":"IEEE Trans. Smart Grid"},{"key":"58_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ISGT.2013.6497835","volume-title":"Proceedings of IEEE Innovative Smart Grid Technologies (ISGT) 2013","author":"D Engel","year":"2013","unstructured":"Engel, D, & Eibl, G (2013). Multi-resolution load curve representation with privacy-preserving aggregation. In Proceedings of IEEE Innovative Smart Grid Technologies (ISGT) 2013. IEEE, Copenhagen, (pp. 1\u20135)."},{"key":"58_CR27","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies (PETS)","author":"M Jawurek","year":"2011","unstructured":"Jawurek, M, Johns, M, Kerschbaum, F (2011). Plug-in privacy for smart metering billing. In Privacy Enhancing Technologies (PETS). Springer, Berlin Heidelberg, (pp. 192\u2013210)."},{"key":"58_CR28","volume-title":"2015 IEEE International Workshop on Information Forensics and Security (WIFS)","author":"Z Erkin","year":"2015","unstructured":"Erkin, Z (2015). Private data aggregation with groups for smart grids in a dynamic setting using CRT. In 2015 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, Rome."},{"key":"58_CR29","unstructured":"(2001). National Institute of Standards and Technology (NIST), Specification for the advanced encryption standard (AES)."},{"key":"58_CR30","unstructured":"ITU-T (2012). Recommendation ITU-T X.509 \u2013 Information technology \u2013 open systems interconnection \u2013 the directory: public-key and attribute certificate frameworks."},{"issue":"3","key":"58_CR31","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubechies","year":"1998","unstructured":"Daubechies, I, & Sweldens, W (1998). Factoring wavelet transforms into lifting steps. J. Fourier Anal. Appl, 4(3), 247\u201369.","journal-title":"J. Fourier Anal. Appl"},{"key":"58_CR32","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2\u20136, 1999 Proceedings. Lecture Notes in Computer Science","author":"P Paillier","year":"1999","unstructured":"Paillier, P (1999). Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J (Ed.) In Advances in Cryptology \u2014 EUROCRYPT \u201999: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2\u20136, 1999 Proceedings. Lecture Notes in Computer Science, (Vol. 1592. Springer, Berlin, pp. 223\u201338)."},{"key":"58_CR33","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/2516930.2516936","volume-title":"Proceedings of the First ACM Workshop on Smart Energy Grid Security - SEGS \u201913","author":"B Defend","year":"2013","unstructured":"Defend, B, & Kursawe, K (2013). Implementation of privacy-friendly aggregation for the smart grid. In Proceedings of the First ACM Workshop on Smart Energy Grid Security - SEGS \u201913. ACM, Conference, Berlin, (pp. 65\u201374)."},{"issue":"6","key":"58_CR34","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W, & Hellman, M (1976). New directions in cryptography. IEEE Trans. Inf. Theory, 22(6), 644\u2013654.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"58_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0173-1","volume-title":"The Laplace distribution and generalizations","author":"S Kotz","year":"2001","unstructured":"Kotz, S, Kozubowski, TJ, Krzysztof, P. (2001). The Laplace distribution and generalizations. Basel: Birkh\u00e4user Basel."},{"issue":"3","key":"58_CR36","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z, Veugen, T, Toft, T, Lagendijk, RL (2012). Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensic. Secur, 7(3), 1053\u201366.","journal-title":"IEEE Trans. Inf. Forensic. Secur"},{"key":"58_CR37","doi-asserted-by":"crossref","unstructured":"Barker, E, Barker, W, Burr, W, Polk, W, Smid, M. (2012). Division, Computer Security NIST Special Publication 800-57, Recommendation for Key Management (Revision 3): NIST.","DOI":"10.6028\/NIST.SP.800-57p1r3"}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-017-0058-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13635-017-0058-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-017-0058-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T18:09:04Z","timestamp":1658858944000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-017-0058-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,20]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["58"],"URL":"https:\/\/doi.org\/10.1186\/s13635-017-0058-3","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,20]]},"article-number":"6"}}