{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:58:21Z","timestamp":1725785901534},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,3,18]]},"DOI":"10.1145\/2480362.2480488","type":"proceedings-article","created":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T15:47:45Z","timestamp":1367423265000},"page":"652-659","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Privacy-friendly tasking and trading of energy in smart grids"],"prefix":"10.1145","author":[{"given":"Tassos","family":"Dimitriou","sequence":"first","affiliation":[{"name":"Athens Information Technology, Greece and Kuwait University, Kuwait"}]},{"given":"Ghassan","family":"Karame","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe, Heidelberg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2007.381742"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"e_1_3_2_1_3_1","unstructured":"E. L. Quinn \"Privacy and the New Energy Infrastructure\" Center for Energy and Environmental Security (CEES) Working Paper No. 09-001. E. L. Quinn \"Privacy and the New Energy Infrastructure\" Center for Energy and Environmental Security (CEES) Working Paper No. 09-001."},{"volume-title":"NISTIR","year":"2010","author":"Smart Grid Cyber Security NIST","key":"e_1_3_2_1_4_1","unstructured":"NIST , \"Guidelines for Smart Grid Cyber Security , Vol. 2 , Privacy and the Smart Grid \", NISTIR 7628, August 2010 . NIST, \"Guidelines for Smart Grid Cyber Security, Vol. 2, Privacy and the Smart Grid\", NISTIR 7628, August 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"volume-title":"Proceedings of IEEE SmartGridComm","year":"2011","author":"Rajagopalan S. Raj","key":"e_1_3_2_1_8_1","unstructured":"S. Raj Rajagopalan , L. Sankar , S. Mohajer , H. Vincent Poor , \" Smart Meter Privacy : A Utility-Privacy Framework \", In Proceedings of IEEE SmartGridComm , 2011 . S. Raj Rajagopalan, L. Sankar, S. Mohajer, H. Vincent Poor, \"Smart Meter Privacy: A Utility-Privacy Framework\", In Proceedings of IEEE SmartGridComm, 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D.\n Chaum\n and \n E.\n van Heyst \"Group Signatures\" Advances in Cryptology--EUROCRYPT\n 1991 Volume \n 547\n of \n Lecture Notes in Computer Science\n . pp. \n 257\n --\n 265 1991. D. Chaum and E. van Heyst \"Group Signatures\" Advances in Cryptology--EUROCRYPT 1991 Volume 547 of Lecture Notes in Computer Science. pp. 257--265 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_13_1","first-page":"148","volume-title":"Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology--CRYPTO","author":"Schoenmakers B.","year":"1999","unstructured":"B. Schoenmakers , \" A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting \", In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology--CRYPTO 1999 , pp. 148 -- 164 . B. Schoenmakers, \"A Simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting\", In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology--CRYPTO 1999, pp. 148--164."},{"volume-title":"Proceedings of the 6th Workshop on Security and Trust Management (STM)","year":"2010","author":"Garcia F. D.","key":"e_1_3_2_1_14_1","unstructured":"F. D. Garcia , B. Jacobs , \" Privacy-Friendly Energy-Metering via Homomorphic Encryption\" , In Proceedings of the 6th Workshop on Security and Trust Management (STM) , 2010 . F. D. Garcia, B. Jacobs, \"Privacy-Friendly Energy-Metering via Homomorphic Encryption\", In Proceedings of the 6th Workshop on Security and Trust Management (STM), 2010."},{"volume-title":"Proceedings of PETS","year":"2011","author":"Kursawe K.","key":"e_1_3_2_1_15_1","unstructured":"K. Kursawe , G. Danezis , and M Kohlweiss , \"Privacy-Friendly Aggregation for the Smart-Grid \", In Proceedings of PETS , 2011 . K. Kursawe, G. Danezis, and M Kohlweiss, \"Privacy-Friendly Aggregation for the Smart-Grid\", In Proceedings of PETS, 2011."},{"volume-title":"CRYPTO","year":"1982","author":"Chaum D.","key":"e_1_3_2_1_16_1","unstructured":"D. Chaum , \" Blind Signatures for Untraceable Payments\" , In CRYPTO , 1982 . D. Chaum, \"Blind Signatures for Untraceable Payments\", In CRYPTO, 1982."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382292"},{"volume-title":"ICASSP","year":"2011","author":"Varodayan D. P.","key":"e_1_3_2_1_20_1","unstructured":"D. P. Varodayan , A. Khisti , \" Smart Meter Privacy Using a Rechargeable Battery : Minimizing the Rate of Information Leakage \", In ICASSP 2011 . D. P. Varodayan, A. Khisti, \"Smart Meter Privacy Using a Rechargeable Battery: Minimizing the Rate of Information Leakage\", In ICASSP 2011."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511496"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281180"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2009","author":"Nakamoto Satoshi","key":"e_1_3_2_1_24_1","unstructured":"Satoshi Nakamoto . Bitcoin: A Peer-to-Peer Electronic Cash System , 2009 . Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, 2009."},{"key":"e_1_3_2_1_25_1","unstructured":"Contracts -- Bitcoin Available from https:\/\/en.bitcoin.it\/wiki\/Contracts Contracts -- Bitcoin Available from https:\/\/en.bitcoin.it\/wiki\/Contracts"}],"event":{"name":"SAC '13: SAC '13","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Coimbra Portugal","acronym":"SAC '13"},"container-title":["Proceedings of the 28th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2480362.2480488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T11:13:56Z","timestamp":1673435636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2480362.2480488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,18]]},"references-count":25,"alternative-id":["10.1145\/2480362.2480488","10.1145\/2480362"],"URL":"https:\/\/doi.org\/10.1145\/2480362.2480488","relation":{},"subject":[],"published":{"date-parts":[[2013,3,18]]},"assertion":[{"value":"2013-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}