Please view the copyright notices at the bottom of this page prior to downloading any papers.
IEEE Pervasive Computing Special Issue on Smart Energy Systems, vol. 10, no. 1, Jan.-Mar. 2011, pp. 49-57.1 [IEEE Xplore entry]Tags: 2011, Author: Bergman, D.C., Author: Gunter, C.A., Author: Jin, D., Author: Juen, J.P., Author: Tanaka, N., Author: Wright, A.K., demand response, demand side management, nonintrusive load monitoring, nonintrusive load-shed verification, pervasive computing, power meters, power station load, residential power meters
Proceedings of the 4th International Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, March 10-12, 2009, pp. 287-297.2 [ACM DL entry]Tags: 2009, access controls, authentication, Author: Borisov, N., Author: Lee, A.J., Author: Minami, K., consistency, distributed applications, distributed proof, pervasive computing
ACM Transactions on Information and System Security, vol. 13, no. 3, Article 25, July 2010.2 [ACM DL entry]Tags: access controls, authentication, Author: Lee, A.J., Author: Minami, K., Author: Winslett, M., distributed applications, distributed proof, pervasive computing