|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-06355-3 |
003 |
DE-He213 |
005 |
20220117034925.0 |
007 |
cr nn 008mamaa |
008 |
140509s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319063553
|9 978-3-319-06355-3
|
024 |
7 |
|
|a 10.1007/978-3-319-06355-3
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
100 |
1 |
|
|a Wen, Mi.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Querying over Encrypted Data in Smart Grids
|h [electronic resource] /
|c by Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a IX, 78 p. 22 illus., 17 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
505 |
0 |
|
|a Introduction -- Equality Query for Auction in Emerging Smart Grid Marketing -- Conjunctive Query over Encrypted Multidimensional Data -- Range Query over Encrypted Metering Data for Financial Audit -- Conclusions and Future Work.
|
520 |
|
|
|a This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Telecommunication.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Lu, Rongxing.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Liang, Xiaohui.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Lei, Jingsheng.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
700 |
1 |
|
|a Shen, Xuemin (Sherman).
|e author.
|0 (orcid)0000-0002-4140-287X
|1 https://orcid.org/0000-0002-4140-287X
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319063560
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319063546
|
830 |
|
0 |
|a SpringerBriefs in Computer Science,
|x 2191-5776
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-06355-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|