|
|
|
|
LEADER |
03407nam a22005535i 4500 |
001 |
978-3-319-06355-3 |
003 |
DE-He213 |
005 |
20151103121302.0 |
007 |
cr nn 008mamaa |
008 |
140509s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319063553
|9 978-3-319-06355-3
|
024 |
7 |
|
|a 10.1007/978-3-319-06355-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
|
|a Wen, Mi.
|e author.
|
245 |
1 |
0 |
|a Querying over Encrypted Data in Smart Grids
|h [electronic resource] /
|c by Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a IX, 78 p. 22 illus., 17 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5768
|
505 |
0 |
|
|a Introduction -- Equality Query for Auction in Emerging Smart Grid Marketing -- Conjunctive Query over Encrypted Multidimensional Data -- Range Query over Encrypted Metering Data for Financial Audit -- Conclusions and Future Work.
|
520 |
|
|
|a This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
700 |
1 |
|
|a Lu, Rongxing.
|e author.
|
700 |
1 |
|
|a Liang, Xiaohui.
|e author.
|
700 |
1 |
|
|a Lei, Jingsheng.
|e author.
|
700 |
1 |
|
|a Shen, Xuemin (Sherman).
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319063546
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5768
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-06355-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|