Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
battery powered vehicles
biblio
Secure Integration of Electric Vehicles with the Power Grid
Submitted by aekwall on Mon, 02/10/2020 - 11:06am
power data
cyber-physical
cyber-physical anomaly detection Engine
detects anomalies
distribution networks
EV
monitoring cyber messages
monitors system behavior
pluggable electric vehicles
critical power grid component
power grid system
Power measurement
power measurements
V2G cyber network
Vehicle-to-grid
vehicle-to-grid system
worst case inspection time
Smart Grid Sensors
Inspection
Monitoring
security
Resiliency
pubcrawl
Protocols
Anomaly Detection
distributed energy resources
power system security
Intrusion Detection
distributed power generation
secure integration
Engines
Human Factors
Compositionality
Electric Vehicles
aggregator
battery powered vehicles
biblio
An anonymous payment system to protect the privacy of electric vehicles
Submitted by BrandonB on Mon, 05/04/2015 - 1:15pm
Energy Provider Company
vehicles
Trusted Platform Module
Trusted Computing
tpm
Servers
secondary cells
Registers
recharging service
recharging infrastructure
Protocols
privacy protection
privacy
financial management
EPC
anonymous credential technique
electrical energy
Electric Vehicles
driver privacy
driver information systems
double spending detection
data privacy
Cryptography
battery powered vehicles
battery
batteries
automobile
authentication
anonymous payment system
biblio
Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid
Submitted by BrandonB on Fri, 05/01/2015 - 6:27am
privacy
vehicle-to-grid networks
Vehicle-to-grid (V2G)
smart power grids
Smart Grids
Smart Grid
Security analysis
security
secure V2G networks
ROPS
role-dependent privacy preservation scheme
Protocols
authentication
power engineering computing
interlinked subprotocols
energy supply
Energy storage
energy demand
electricity
cyber security vulnerability
Cryptographic Protocols
battery vehicles
battery powered vehicles
authentication mechanisms