TY - JOUR AU - Verbong, G. P. AU - Beemsterboer, S. AU - Sengers, F. PY - 2013 DA - 2013// TI - Smart grids or smart users? Involving users in developing a low carbon electricity economy JO - Energy Policy VL - 52 UR - https://doi.org/10.1016/j.enpol.2012.05.003 DO - 10.1016/j.enpol.2012.05.003 ID - Verbong2013 ER - TY - CHAP AU - Lampropoulos, I. AU - Vanalme, G. AU - Kling, W. PY - 2010 DA - 2010// TI - A methodology for modeling the behavior of electricity prosumers within the smart grid BT - Proceedings of Innovative Smart Grid Technologies Conference Europe (ISGT Europe) PB - IEEE PES CY - Gothenburg ID - Lampropoulos2010 ER - TY - BOOK AU - Jackson, T. PY - 2005 DA - 2005// TI - Motivating Sustainable Consumption: A Review of Evidence on Consumer Behaviour and Behavioural Change: a Report to the Sustainable Development Research Network PB - Centre for Environmental Strategy CY - University of Surrey ID - Jackson2005 ER - TY - STD TI - S Van Dam, Smart energy management for households. A+BE | Architecture and the Built Environment. 3(5), 1–334 (2013). doi:10.7480/abe.2013.5. ID - ref4 ER - TY - JOUR AU - Spagnolli, A. AU - Corradi, N. AU - Gamberini, L. AU - Hoggan, E. AU - Jacucci, G. AU - Katzeff, C. AU - Broms, L. AU - Jönsson, L. PY - 2011 DA - 2011// TI - Eco-Feedback on the go: motivating energy awareness JO - IEEE Comput. VL - 44 UR - https://doi.org/10.1109/MC.2011.125 DO - 10.1109/MC.2011.125 ID - Spagnolli2011 ER - TY - JOUR AU - Honebein, P. C. AU - Cammarano, R. F. AU - Boice, C. PY - 2011 DA - 2011// TI - Building a social roadmap for the smart grid JO - Electr. J. VL - 24 UR - https://doi.org/10.1016/j.tej.2011.03.015 DO - 10.1016/j.tej.2011.03.015 ID - Honebein2011 ER - TY - BOOK AU - Giordano, V. AU - Gangale, F. AU - Fulli, G. AU - Jiménez, M. S. AU - Onyeji, I. AU - Colta, A. AU - Papaioannou, I. AU - Mengolini, A. AU - Alecu, C. AU - Ojala, T. PY - 2011 DA - 2011// TI - Smart Grid Projects in Europe: Lessons Learned and Current Developments PB - Publications Office of the European Union CY - Luxembourg ID - Giordano2011 ER - TY - JOUR AU - Liu, J. AU - Xiao, Y. AU - Li, S. AU - Liang, W. AU - Chen, C. PY - 2012 DA - 2012// TI - Cyber security and privacy issues in smart grids JO - IEEE Commun. Surv. Tutor. VL - 14 UR - https://doi.org/10.1109/SURV.2011.122111.00145 DO - 10.1109/SURV.2011.122111.00145 ID - Liu2012 ER - TY - JOUR AU - McDaniel, P. AU - McLaughlin, S. PY - 2009 DA - 2009// TI - Security and privacy challenges in the smart grid JO - IEEE Sec Privacy VL - 7 UR - https://doi.org/10.1109/MSP.2009.76 DO - 10.1109/MSP.2009.76 ID - McDaniel2009 ER - TY - JOUR AU - Marmol, F. G. AU - Sorge, C. AU - Ugus, O. AU - Pérez, G. M. PY - 2012 DA - 2012// TI - Do not snoop my habits: preserving privacy in the smart grid JO - IEEE Commun. Mag. VL - 50 UR - https://doi.org/10.1109/MCOM.2012.6194398 DO - 10.1109/MCOM.2012.6194398 ID - Marmol2012 ER - TY - JOUR AU - Birman, K. AU - Jelasity, M. AU - Kleinberg, R. AU - Tremel, E. PY - 2015 DA - 2015// TI - Building a secure and privacy-preserving smart grid JO - ACM SIGOPS Oper. Syst. Rev. VL - 49 UR - https://doi.org/10.1145/2723872.2723891 DO - 10.1145/2723872.2723891 ID - Birman2015 ER - TY - STD TI - Z Erkin, G Tsudik, in Applied Cryptography and Network Security (ACNS 2012), Vol. 7341 of Lecture Notes in Computer Science. Private computation of spatial and temporal power consumption with smart meters (Springer, 2012), pp. 561–577. ID - ref12 ER - TY - CHAP AU - Kursawe, K. AU - Danezis, G. AU - Kohlweiss, M. PY - 2011 DA - 2011// TI - Privacy-friendly aggregation for the smart-grid BT - Proceedings of the 11th international conference on Privacy enhancing technologies, PETS’11 PB - Springer-Verlag CY - Berlin, Heidelberg UR - https://doi.org/10.1007/978-3-642-22263-4_10 DO - 10.1007/978-3-642-22263-4_10 ID - Kursawe2011 ER - TY - STD TI - C Efthymiou, G Kalogridis, in First IEEE International Conference on Smart Grid Communications. Smart grid privacy via anonymization of smart metering data (IEEE, 2010), pp. 238–243. ID - ref14 ER - TY - JOUR AU - Damgard, I. AU - Geisler, M. AU - Kroigard, M. PY - 2009 DA - 2009// TI - A correction to ‘efficient and secure comparison for on-line auctions’ JO - Int. J. Appl. Cryptogr. VL - 1 UR - https://doi.org/10.1504/IJACT.2009.028031 DO - 10.1504/IJACT.2009.028031 ID - Damgard2009 ER - TY - JOUR AU - Veugen, T. AU - Blom, F. AU - de Hoogh, S. AU - Erkin, Z. PY - 2015 DA - 2015// TI - Secure comparison protocols in the semi-honest model JO - IEEE J. Sel. Top. Signal Process. VL - 9 UR - https://doi.org/10.1109/JSTSP.2015.2429117 DO - 10.1109/JSTSP.2015.2429117 ID - Veugen2015 ER - TY - STD TI - Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft, in Privacy Enhancing Technologies (PET’09), Vol. 5672 of LNCS. Privacy-preserving face recognition (Springer, 2009), pp. 235–253. ID - ref17 ER - TY - CHAP AU - Veugen, T. PY - 2012 DA - 2012// TI - Improving the DGK comparison protocol BT - IEEE Workshop on Information Forensics and Security PB - IEEE WIFS CY - Tenerife ID - Veugen2012 ER - TY - STD TI - JR Troncoso-Pastoriza, S Katzenbeisser, MU Celik, AN Lemma, in ACM Workshop on Multimedia and Security. A secure multidimensional point inclusion protocol (ACM, 2007), pp. 109–120. ID - ref19 ER - TY - JOUR AU - Bianchi, T. AU - Piva, A. AU - Barni, M. PY - 2010 DA - 2010// TI - Composite signal representation for fast and storage-efficient processing of encrypted signals JO - IEEE Trans. Inf. Forensics Sec. VL - 5 UR - https://doi.org/10.1109/TIFS.2009.2036230 DO - 10.1109/TIFS.2009.2036230 ID - Bianchi2010 ER - TY - STD TI - M Barni, T Bianchi, D Catalano, Raimondo Di M, R Donida Labati, et al., in ACM Proceedings of the 12th ACM workshop on Multimedia and security. Privacy-Preserving Fingercode Authentication, (2010), pp. 231–240. ID - ref21 ER - TY - STD TI - MRT Beye, Z Erkin, RL Lagendijk, in Proc. in IEEE Workshop on Information Forensics and Security (WIFS’11). Efficient privacy preserving k-means clustering in a three-party setting, (2011), pp. 1–6. ID - ref22 ER - TY - JOUR AU - Erkin, Z. AU - Veugen, T. AU - Toft, T. AU - Lagendijk, R. L. PY - 2012 DA - 2012// TI - Generating private recommendations efficiently using homomorphic encryption and data packing JO - IEEE Trans. Inf. Forensics Sec. VL - 7 UR - https://doi.org/10.1109/TIFS.2012.2190726 DO - 10.1109/TIFS.2012.2190726 ID - Erkin2012 ER - TY - STD TI - P Paillier, in Eurocrypt ’99. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes (Springer, 1999), pp. 223–238. ID - ref24 ER - TY - STD TI - I Damgård, M Geisler, M Krøigaard, in Australasian Conference on Information Security and Privacy (ACISP’07), Vol. 4586 of LNCS. Efficient and secure comparison for on-line auctions (Springer, 2007), pp. 416–430. ID - ref25 ER - TY - STD TI - Cyber Security Group, SeComLib Secure Computation Library. http://cybersecurity.tudelft.nl. Accessed 2013. UR - http://cybersecurity.tudelft.nl ID - ref26 ER -