{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:21:35Z","timestamp":1743092495232,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031096396"},{"type":"electronic","value":"9783031096402"}],"license":[{"start":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T00:00:00Z","timestamp":1668816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T00:00:00Z","timestamp":1668816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-09640-2_13","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:29:41Z","timestamp":1668760181000},"page":"277-299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment"],"prefix":"10.1007","author":[{"given":"Rachana","family":"Patil","sequence":"first","affiliation":[]},{"given":"Yogesh H.","family":"Patil","sequence":"additional","affiliation":[]},{"given":"Aparna","family":"Bannore","sequence":"additional","affiliation":[]},{"given":"Arijit","family":"Karati","sequence":"additional","affiliation":[]},{"given":"Renu","family":"Kachhoriya","sequence":"additional","affiliation":[]},{"given":"Manjiri","family":"Ranjanikar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"116168","DOI":"10.1016\/j.apenergy.2020.116168","volume":"282","author":"M Sheha","year":"2021","unstructured":"M. Sheha, K. Mohammadi, K. Powell, Techno-economic analysis of the impact of dynamic electricity prices on solar penetration in a smart grid environment with distributed energy storage. Appl. Energy 282, 116168 (2021)","journal-title":"Appl. Energy"},{"issue":"1","key":"13_CR2","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.asej.2020.05.004","volume":"12","author":"OM Butt","year":"2021","unstructured":"O.M. Butt, M. Zulqarnain, T.M. Butt, Recent advancement in smart grid technology: future prospects in the electrical power network. Ain Shams Eng. J. 12(1), 687\u2013695 (2021)","journal-title":"Ain Shams Eng. J."},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1145\/3459104.3459136","volume-title":"2021 International Symposium on Electrical, Electronics and Information Engineering","author":"A Panayiotou","year":"2021","unstructured":"A. Panayiotou, N.P. Stavrou, E. Stergiou, Applying the industry 4.0 in a smart gas grid: the Greek Gas Distribution Network case, in 2021 International Symposium on Electrical, Electronics and Information Engineering, (2021), pp. 180\u2013184"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/ICSGSC.2018.8541314","volume-title":"2018 2nd International Conference on Smart Grid and Smart Cities (ICSGSC)","author":"AR Al-Ali","year":"2018","unstructured":"A.R. Al-Ali, T. Landolsi, M.H. Hassan, M. Ezzeddine, M. Abdelsalam, M. Baseet, An IoT-based smart utility meter, in 2018 2nd International Conference on Smart Grid and Smart Cities (ICSGSC), (IEEE, 2018), pp. 80\u201383"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.energy.2018.03.010","volume":"151","author":"H Lund","year":"2018","unstructured":"H. Lund, Renewable heating strategies and their consequences for storage and grid infrastructures comparing a smart grid to a smart energy systems approach. Energy 151, 94\u2013102 (2018)","journal-title":"Energy"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"4164","DOI":"10.1109\/TSG.2018.2850841","volume":"10","author":"F Dababneh","year":"2018","unstructured":"F. Dababneh, L. Li, Integrated electricity and natural gas demand response for manufacturers in the smart grid. IEEE Trans. Smart Grid 10(4), 4164\u20134174 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"key":"13_CR7","volume-title":"A Two-Stage Flexibility-Oriented Stochastic Energy Management Strategy for Multi-Microgrids Considering Interaction With Gas Grid","author":"F Kamrani","year":"2021","unstructured":"Kamrani, F., Fattaheian-Dehkordi, Sajjad; Gholami, Mohammad; Abbaspour, Ali; Fotuhi-Firuzabad, Mahmud; Lehtonen, Matti 2021. A Two-Stage Flexibility-Oriented Stochastic Energy Management Strategy for Multi-Microgrids Considering Interaction With Gas Grid"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1145\/3316782.3322754","volume-title":"Proceedings of the 12th ACM International Conference on PErvasive Technologies Related to Assistive Environments","author":"S Colombo","year":"2019","unstructured":"S. Colombo, Y. Lim, F. Casalegno, Deep vision shield: assessing the use of hmd and wearable sensors in a smart safety device, in Proceedings of the 12th ACM International Conference on PErvasive Technologies Related to Assistive Environments, (2019), pp. 402\u2013410"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/CIST.2018.8596636","volume-title":"2018 IEEE 5th International Congress on Information Science and Technology (CiSt)","author":"A Elmrini","year":"2018","unstructured":"A. Elmrini, A.G. Amrani, Wireless sensors network for traffic surveillance and management in smart cities, in 2018 IEEE 5th International Congress on Information Science and Technology (CiSt), (IEEE, 2018), pp. 562\u2013566"},{"unstructured":"S. Surnov, I. Bychkovskiy, G. Surnov, S. Krasnov, Smart Monitoring: remote-monitoring technology of power, gas, and water consumption in Smart Cities. arXiv preprint arXiv:1910.08759 (2019)","key":"13_CR10"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.apenergy.2017.09.066","volume":"219","author":"J Qiu","year":"2018","unstructured":"J. Qiu, J. Zhao, H. Yang, D. Wang, Z.Y. Dong, Planning of solar photovoltaics, battery energy storage system and gas micro turbine for coupled micro energy grids. Appl. Energy 219, 361\u2013369 (2018)","journal-title":"Appl. Energy"},{"issue":"1","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1109\/TSG.2018.2828146","volume":"10","author":"EAM Cese\u00f1a","year":"2018","unstructured":"E.A.M. Cese\u00f1a, P. Mancarella, Energy systems integration in smart districts: robust optimisation of multi-energy flows in integrated electricity, heat and gas networks. IEEE Trans. Smart Grid 10(1), 1122\u20131131 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"13_CR13","first-page":"39","volume":"57","author":"J Savickis","year":"2020","unstructured":"J. Savickis, L. Zemite, I. Bode, L. Jansons, Natural gas metering and its accuracy in the smart gas supply systems. Latv. J. Phys. Tech. Sci. 57(5), 39\u201350 (2020)","journal-title":"Latv. J. Phys. Tech. Sci."},{"key":"13_CR14","first-page":"494","volume-title":"IEEE International Conference on Services Computing, 2004 (SCC 2004). Proceedings","author":"X Li","year":"2004","unstructured":"X. Li, K. Chen, Identity based proxy-signcryption scheme from pairings, in IEEE International Conference on Services Computing, 2004 (SCC 2004). Proceedings, vol. 2004, (IEEE, 2004), pp. 494\u2013497"},{"key":"13_CR15","first-page":"167","volume-title":"International Conference on Computational and Information Science","author":"Q Wang","year":"2005","unstructured":"Q. Wang, Z. Cao, Efficient ID-based proxy signature and proxy signcryption form bilinear pairings, in International Conference on Computational and Information Science, (Springer, Berlin\/Heidelberg, 2005), pp. 167\u2013172"},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1007\/11534310_103","volume-title":"International Conference on Networking and Mobile Computing","author":"M Wang","year":"2005","unstructured":"M. Wang, H. Li, Z. Liu, Efficient identity based proxy-signcryption schemes with forward security and public verifiability, in International Conference on Networking and Mobile Computing, (Springer, Berlin\/Heidelberg, 2005), pp. 982\u2013991"},{"key":"13_CR17","first-page":"41","volume":"2008","author":"HM Elkamchouchi","year":"2008","unstructured":"H.M. Elkamchouchi, Y. Abouelseoud, A new proxy identity-based signcryption scheme for partial delegation of signing rights. IACR Cryptol. ePrint Arch. 2008, 41 (2008)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1109\/MINES.2009.69","volume-title":"2009 International Conference on Multimedia Information Networking and Security","author":"XX Tian","year":"2009","unstructured":"X.X. Tian, J.P. Xu, H.J. Li, Y. Peng, A.Q. Zhang, Secure ID-based proxy signcryption scheme with designated proxy signcrypter, in 2009 International Conference on Multimedia Information Networking and Security, vol. 1, (IEEE, 2009), pp. 351\u2013355"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/COMPSAC.2007.186","volume-title":"31st Annual International Computer Software and Applications Conference (COMPSAC 2007)","author":"CC Tsai","year":"2007","unstructured":"C.C. Tsai, K.C. Liao, T.H. Chen, W.B. Lee, Security enhancement of a novel proxy key generation protocol, in 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), vol. 2, (IEEE, 2007), pp. 681\u2013688"},{"issue":"3","key":"13_CR20","first-page":"200","volume":"1","author":"G Swapna","year":"2012","unstructured":"G. Swapna, P.V.S.S.N. Gopal, T. Gowri, P.V. Reddy, An efficient ID-based proxy signcryption scheme. Int. J. Inf. Netw. Secur. 1(3), 200 (2012)","journal-title":"Int. J. Inf. Netw. Secur."},{"key":"13_CR21","first-page":"8887","volume":"975","author":"HM Elkamchouchi","year":"2013","unstructured":"H.M. Elkamchouchi, Y. Abouelseoud, E.F.A. Elkhair, K. Elsheikh, An efficient ID-based proxy signcryption scheme without bilinear pairings. Int. J. Comput. Appl. 975, 8887 (2013)","journal-title":"Int. J. Comput. Appl."},{"doi-asserted-by":"crossref","unstructured":"N.W. Lo, J.L. Tsai, A provably secure proxy signcryption scheme using bilinear pairings. J. Appl. Math., 2014 (2014)","key":"13_CR22","DOI":"10.1155\/2014\/454393"},{"issue":"7","key":"13_CR23","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.1016\/j.camwa.2010.07.015","volume":"60","author":"HY Lin","year":"2010","unstructured":"H.Y. Lin, T.S. Wu, S.K. Huang, Y.S. Yeh, Efficient proxy signcryption scheme with provable CCA and CMA security. Comput. Math. Appl. 60(7), 1850\u20131858 (2010)","journal-title":"Comput. Math. Appl."},{"issue":"6","key":"13_CR24","first-page":"1183","volume":"20","author":"C Zhou","year":"2018","unstructured":"C. Zhou, Y. Zhang, L. Wang, A provable secure identity-based generalized proxy signcryption scheme. Int. J. Netw. Secur. 20(6), 1183\u20131193 (2018)","journal-title":"Int. J. Netw. Secur."},{"doi-asserted-by":"crossref","unstructured":"H. Yu, Z. Wang, J. Li, X. Gao, Identity-based proxy signcryption protocol with universal composability. Secur. Commun. Netw. 2018 (2018)","key":"13_CR25","DOI":"10.1155\/2018\/9531784"},{"issue":"1","key":"13_CR26","first-page":"455","volume":"14","author":"NW Hundera","year":"2020","unstructured":"N.W. Hundera, Q. Mei, H. Xiong, D.M. Geressu, A secure and efficient identity-based proxy signcryption in cloud data sharing. KSII Trans. Internet Inf. Syst. (TIIS) 14(1), 455\u2013472 (2020)","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"issue":"4","key":"13_CR27","first-page":"561","volume":"22","author":"H Guo","year":"2020","unstructured":"H. Guo, L. Deng, An identity based proxy signcryption scheme without pairings. Int. J. Netw. Secur. 22(4), 561\u2013568 (2020)","journal-title":"Int. J. Netw. Secur."},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1016\/j.procs.2020.03.449","volume":"167","author":"PR Yogesh","year":"2020","unstructured":"P.R. Yogesh, Formal verification of secure evidence collection protocol using BAN logic and AVISPA. Proc. Comput. Sci. 167, 1334\u20131344 (2020)","journal-title":"Proc. Comput. Sci."},{"key":"13_CR29","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.procs.2020.04.120","volume":"171","author":"PR Yogesh","year":"2020","unstructured":"P.R. Yogesh, Backtracking tool root-tracker to identify true source of cyber crime. Proc. Comput. Sci. 171, 1120\u20131128 (2020)","journal-title":"Proc. Comput. Sci."},{"unstructured":"R.Y. Patil, S.R. Devane, Network forensic investigation protocol to identify true origin of cyber crime. J. King Saud Univ. Comput. Inf. Sci. (2019)","key":"13_CR30"},{"doi-asserted-by":"crossref","unstructured":"C. Zhou, Z. Zhao, W. Zhou, Y. Mei, Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Secur. Commun. Netw. 2017 (2017)","key":"13_CR31","DOI":"10.1155\/2017\/8405879"},{"issue":"8","key":"13_CR32","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1002\/sec.1092","volume":"8","author":"Y Ming","year":"2015","unstructured":"Y. Ming, Y. Wang, Proxy signcryption scheme in the standard model. Secur. Commun. Netw. 8(8), 1431\u20131446 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"13_CR33","doi-asserted-by":"publisher","first-page":"141910","DOI":"10.1109\/ACCESS.2019.2943718","volume":"7","author":"H Yu","year":"2019","unstructured":"H. Yu, Z. Wang, Construction of certificateless proxy signcryption scheme from CMGs. IEEE Access 7, 141910\u2013141919 (2019)","journal-title":"IEEE Access"}],"container-title":["Emerging Trends in Cybersecurity Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09640-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T10:30:09Z","timestamp":1701426609000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09640-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,19]]},"ISBN":["9783031096396","9783031096402"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09640-2_13","relation":{},"subject":[],"published":{"date-parts":[[2022,11,19]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}