SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Yuen C, Oudalov A, Timbus A. The provision of frequency control reserves from multiple micro-grids. IEEE Transactions on Industrial Electronics 2011; 587(1): 173183.
  • 2
    Ramachandran B, Srivastava SK, Edrington CS, et al. An intelligent auction scheme for smart grid market using a hybrid immune algorithm. IEEE Transactions on Industrial Electronics 2011; 58(10): 46034612.
  • 3
    Forte VJ. Smart grid at national grid. In Proceeding of ISGT 2010, Gaithersburg, MD, Jan. 2010; 14.
  • 4
    Chakraborty S, Weiss MD, Simoes MG. Distributed intelligent energy management system for a single-phase high-frequency AC microgrid. IEEE Transactions on Industrial Electronics 2007; 54(1): 97109.
  • 5
    Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9): 16211632.
  • 6
    Li H, Liang X, Lu R, Lin X, Shen X. EDR: an efficient demand response scheme for achieving forward secrecy in smart grid. In Proceedings of 2012 IEEE Global Telecommunications Conference (GLOBECOM 2012), to appear.
  • 7
    Chang YF, Chang CC. Enhanced anonymous auction protocols with freewheeling bids. In Proceedings of 20th International Conference on Advanced Information Networking and Application (AINA06), 2006; 353358.
  • 8
    Li MJ, Justie STJ, Jennifer HCT. Practical electronic auction scheme with strong anonymity and bidding privacy. Information Sciences 2011; 181(12): 25762586.
  • 9
    Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Information Sciences 2010; 180(13): 25762587.
  • 10
    Bompard E, Lu W, Napoli R. Network constraint impacts on the competitive electrically markets under supply-side strategic bidding. IEEE Transactions on Power Systems 2006; 21(1): 160170.
  • 11
    Li X, Liang X, Lu R, Lin X, Zhu H, Shen X. Securing smart grid: cyber attacks, countermeasures and challenges. IEEE Communications Magazine 2012; 50(8): 3845.
  • 12
    Song Y, Ni Y, Wen F. An improvement of generation firm's bidding strategies based on conjectural variation regulation via dynamic learning. In proceedings of the CSEE 2003; 23(12): 2327.
  • 13
    Kanga DJ, Kimb BH, Hur D. Supplier bidding strategy based on non-cooperative game theory concepts in single auction power pools. Electric Power Systems Research 2007; 77(5–6): 630636.
  • 14
    Liaw HT, Juang WS, Lin CK. An electronic online bidding auction protocol with both security and efficiency. Applied Mathematics and Computation 2006; 174(2): 14871497.
  • 15
    Liu Q, Wang G, Wu J. An efficient privacy preserving keyword search scheme in cloud computing. In Proceeding of 2009 International Conference on Computational Science and Engineering, 2009; 715720.
  • 16
    Boneh D, Crescenzo DG, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proceeding of EUROCRYPT 2004. LNCS, vol. 3027, 506522.
  • 17
    Fadlullah ZM, Kato N, Lu R, Shen X, Nozaki Y. Towards secure targeted broadcast in smart grid. IEEE Communications Magazine 2012; 50(5): 150156.
  • 18
    Fouda M, Fadlullah ZM, Kato N, Lu R, Shen X. A light-weight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid 2011; 2(4): 675685.
  • 19
    Lin X, Lu R, Foxton K, Shen X. An efficient searchable encryption scheme and its application in network forensics. In Proceeding of E-Forensics 2010, LNICST 56, 6678.
  • 20
    Zhang B, Zhang FG. An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications 2011; 34(1): 262267.
  • 21
    Dan B, Ben L, Hovav S. Short signatures from the Weil pairing. Journal of Cryptology 2004; 17(4): 297319.
  • 22
    Scott M. Efficient implementation of cryptographic pairings. Available: http://ecrypt-ss07.rhul.ac.uk/Slides/Thursday/mscottsamos07.pdf
  • 23
  • 24
    Libert B, Quisquater JJ. The exact security of an identity based signature and its applications. Preprint available at http://eprint.iacr.org/2004/102.
  • 25
    Galbraith SD. Pairings. Advances in Elliptic Curve Cryptography, Chapter 9, Cambridge University Press: New York, NY, USA; 2005; 183213.