Fig. 2From: Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscationA triangular key distribution scheme for a locality LiBack to article page