On Privacy-Preserving Protocols for Smart Metering Systems (Record no. 79020)

000 -LEADER
fixed length control field 03206nam a22005535i 4500
001 - CONTROL NUMBER
control field 978-3-319-40718-0
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801220848.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160813s2017 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319407180
-- 978-3-319-40718-0
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Borges de Oliveira, Fábio.
245 10 - TITLE STATEMENT
Title On Privacy-Preserving Protocols for Smart Metering Systems
Sub Title Security and Privacy in Smart Grids /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2017.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XXVII, 143 p. 41 illus., 37 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Part I: Foundations -- Introduction -- Background and Models -- A Selective Review -- Part II: Contributions -- Reasons to Measure Frequently and Their Requirements -- Quantifying the Aggregation Size -- Selected Privacy-Preserving Protocols -- Analytical Comparison -- Simulation and Validation -- Concluding Remarks.
520 ## - SUMMARY, ETC.
Summary, etc This book presents current research in privacy-preserving protocols for smart grids. It contains several approaches and compares them analytically and by means of simulation. In particular, the book introduces asymmetric DC-Nets, which offer an ideal combination of performance and features in comparison with homomorphic encryption; data anonymization via cryptographic protocols; and data obfuscation by means of noise injection or by means of the installation of storage banks. The author shows that this theory can be leveraged into several application scenarios, and how asymmetric DC-Nets are generalizations of additive homomorphic encryption schemes and abstractions of symmetric DC-Nets. The book provides the reader with an understanding about smart grid scenarios, the privacy problem, and the mathematics and algorithms used to solve it.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-319-40718-0
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2017.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Application software.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Communications Engineering, Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptology.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.