Security issues of a phasor data concentrator for smart grid infrastructure
EWDC '11 Proceedings of the 13th European Workshop on Dependable Computing
Survey Paper: A survey on the communication architectures in smart grid
Computer Networks: The International Journal of Computer and Telecommunications Networking
Conditional access smart meter privacy based on multi-resolution wavelet analysis
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
S2A: secure smart household appliances
Proceedings of the second ACM conference on Data and Application Security and Privacy
Neighborhood watch: security and privacy analysis of automatic meter reading systems
Proceedings of the 2012 ACM conference on Computer and communications security
Computer security and the modern home
Communications of the ACM
Privacy is a process, not a PET: a theory for effective privacy practice
Proceedings of the 2012 workshop on New security paradigms
Selling power back to the grid in a secure and privacy-preserving manner
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Combating time synchronization attack: a cross layer defense mechanism
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems
Security and privacy of electric vehicles in the smart grid context: problem and solution
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Design and implementation of privacy preserving billing protocol for smart grid
The Journal of Supercomputing
A load control method for small data centers participating in demand response programs
Future Generation Computer Systems
Towards Privacy Protection in Smart Grid
Wireless Personal Communications: An International Journal
Hi-index | 0.02 |
Although researchers have spent considerable time on smart-grid cybersecurity issues, major problems remain unsolved. This article presents a high-level review of authentication and encryption solutions for smart-grid architectures.