, BEIS, 2018.

S. Together, Report on Deployment of Linky Smart Power Meters in the Area, pp.1-32, 2018.

, Guidelines for Smart Grid Cyber Security, vol.1, 2010.

A. Narayanan and V. Shmatikov, Robust De-Anonymization of Large Sparse Datasets, Proc. -IEEE Symp. Secur. Priv, pp.111-125, 2008.

. Cisco, The Zettabyte Era: Trends and Analysis, Cisco Vis. Netw. Index, pp.1-29, 2015.

S. Mach, D. Rossi, G. Tagliavini, A. Marongiu, and L. Benini, A Transprecision Floating-Point Architecture for Energy-Efficient Embedded Computing, Proc. -IEEE Int. Symp. Circuits Syst, 2018.

L. Sweeney, k-Anonymity: A Model for Preserving Privacy, Fuzziness Knowl-Based Syst, vol.10, issue.05, pp.557-570, 2002.

C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy, Found. Trends Theor. Comput. Sci, vol.9, issue.3-4, pp.211-487, 2013.

S. , A Survey of Techniques for Approximate Computing, ACM Comput. Surv, vol.48, issue.4, pp.1-33, 2016.

A. C. Malossi, The Transprecision Computing Paradigm: Concept, Design, and Applications, Des. Autom. Test Eur. Conf. Exhib, pp.1105-1110, 2018.

G. Tagliavini, S. Mach, D. Rossi, A. Marongiu, and L. Benin, A Transprecision Floating-Point Platform for Ultra-Low Power Computing, Proc. 2018 Des. Autom. Test Eur. Conf. Exhib. DATE, pp.151-1056, 2018.

J. Byun, A. Kamra, E. Bertino, and N. Li, Efficient k-Anonymization Using Clustering Techniques, pp.188-200, 2007.

M. Kowalczyk, M. Martínez-corral, T. Cichocki, and P. Andrés, One-Dimensional Error-Diffusion Technique Adapted for Binarization of Rotationally Symmetric Pupil Filters, Opt. Commun, vol.114, issue.3-4, pp.211-218, 1995.

V. Ostromoukhov, A Simple and Efficient Error-Diffusion Algorithm

M. Williams, Electricity System and Market in Japan, IT World, 2011.

O. Kengo and N. Hiroaki, Big Data Anonymization Method for Demand Response, Int. Conf. Internet Comput. Big Data, pp.76-82, 2014.