Now showing items 1-3 of 3
Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs
One of the the most propitious enablers of the Smart Grid paradigm, and a rather low-hanging fruit, is Demand Response (DR) programs. DR is a set of courses of actions to reach and maintain the supply-demand equilibrium ...
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
(Springer London ltd., 2015-12)
Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead ...
Punctured interval broadcast encryption scheme with free riders
In Broadcast Encryption (BE) schemes, the problem is to encrypt a content for a group of dynamically changing privileged (subscriber) subset within a receiver population. A popular approach is to carefully distribute a ...