000 03206nam a22005535i 4500
001 978-3-319-40718-0
003 DE-He213
005 20220801220848.0
007 cr nn 008mamaa
008 160813s2017 sz | s |||| 0|eng d
020 _a9783319407180
_9978-3-319-40718-0
024 7 _a10.1007/978-3-319-40718-0
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aBorges de Oliveira, Fábio.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_952790
245 1 0 _aOn Privacy-Preserving Protocols for Smart Metering Systems
_h[electronic resource] :
_bSecurity and Privacy in Smart Grids /
_cby Fábio Borges de Oliveira.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXXVII, 143 p. 41 illus., 37 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPart I: Foundations -- Introduction -- Background and Models -- A Selective Review -- Part II: Contributions -- Reasons to Measure Frequently and Their Requirements -- Quantifying the Aggregation Size -- Selected Privacy-Preserving Protocols -- Analytical Comparison -- Simulation and Validation -- Concluding Remarks.
520 _aThis book presents current research in privacy-preserving protocols for smart grids. It contains several approaches and compares them analytically and by means of simulation. In particular, the book introduces asymmetric DC-Nets, which offer an ideal combination of performance and features in comparison with homomorphic encryption; data anonymization via cryptographic protocols; and data obfuscation by means of noise injection or by means of the installation of storage banks. The author shows that this theory can be leveraged into several application scenarios, and how asymmetric DC-Nets are generalizations of additive homomorphic encryption schemes and abstractions of symmetric DC-Nets. The book provides the reader with an understanding about smart grid scenarios, the privacy problem, and the mathematics and algorithms used to solve it.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aApplication software.
_952791
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputer and Information Systems Applications.
_952792
650 2 4 _aCryptology.
_931769
710 2 _aSpringerLink (Online service)
_952793
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319407173
776 0 8 _iPrinted edition:
_z9783319407197
776 0 8 _iPrinted edition:
_z9783319821634
856 4 0 _uhttps://doi.org/10.1007/978-3-319-40718-0
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c79020
_d79020