{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:03:30Z","timestamp":1743073410514,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031209734"},{"type":"electronic","value":"9783031209741"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20974-1_14","type":"book-chapter","created":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T08:06:38Z","timestamp":1668067598000},"page":"279-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Practical Single-Pass Oblivious Aggregation and\u00a0Billing Computation Protocols for\u00a0Smart Meters"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8228-5016","authenticated-orcid":false,"given":"Kalikinkar","family":"Mandal","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,10]]},"reference":[{"key":"14_CR1","unstructured":"Commission for energy regulation (cer). (2012). cer smart metering project - electricity customer behaviour trial, 2009\u20132010 [dataset]. www.ucd.ie\/issda\/data\/commissionforenergyregulationcer\/ (2012). Accessed May 2022"},{"key":"14_CR2","unstructured":"Benchmarking smart metering deployment in the eu-28. Accessed Aug 2021. https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/b397ef73-698f-11ea-b735- 01aa75ed71a1\/language-en?WT.mc_id=Searchresult &WT.ria_c=37085 &WT.ria_f=3608 &WT.ria_ev=search (2022). Accessed 10 June 2022"},{"key":"14_CR3","unstructured":"Data protection act 2018. www.legislation.gov.uk\/ukpga\/2018\/12\/contents\/enacted (2022). Accessed 10 June 2022"},{"key":"14_CR4","unstructured":"Data protection impact assessment template for smart grid and smart metering systems. https:\/\/ec.europa.eu\/energy\/content\/data-protection-impact-assessment-template-smart-grid-and-smart- metering-systems_en?redir=1 (2022). Accessed 10 June 2022"},{"key":"14_CR5","unstructured":"The edison foundation. electric company smart meter deployments: Foundation for a smart grid (2021 update), accessed in 2021. www.edisonfoundation.net\/-\/media\/Files\/IEI\/publications\/IEI_Smart_Meter_Report_April_2021.ashx (2022). Accessed 10 June 2022"},{"key":"14_CR6","unstructured":"Engage Hub Kit. https:\/\/efergy.com\/engage\/ (2022). Accessed 10 June 2022"},{"key":"14_CR7","unstructured":"The gnu multiple precision arithmetic library. https:\/\/gmplib.org\/ (2022). Accessed 10 June 2022"},{"key":"14_CR8","unstructured":"Naperville smart meter awareness v. city of naperville, no. 16\u20133766 (7th cir. 2018). https:\/\/law.justia.com\/cases\/federal\/appellate-courts\/ca7\/16-3766\/16-3766-2018-08-16.html (2022). Accessed 10 June 2022"},{"key":"14_CR9","unstructured":"Rainforest Energy Monitoring Gateway for Smart Meters. www.rainforestautomation.com\/ (2022). Accessed 10 June 2022"},{"key":"14_CR10","unstructured":"Smarter Home Energy Management. www.emporiaenergy.com\/ (2022). Accessed 10 June 2022"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-24178-9_9","volume-title":"Information Hiding","author":"G \u00c1cs","year":"2011","unstructured":"\u00c1cs, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118\u2013132. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_9"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Ambrosin, M., Hosseini, H., Mandal, K., Conti, M., Poovendran, R.: Verifiable and privacy-preserving fine-grained data-collection for smart metering. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 655\u2013658 (2015). https:\/\/doi.org\/10.1109\/CNS.2015.7346882","DOI":"10.1109\/CNS.2015.7346882"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Ambrosin, M., Hosseini, H., Mandal, K., Conti, M., Poovendran, R.: Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 163\u2013171 (2016). https:\/\/doi.org\/10.1109\/CNS.2016.7860482","DOI":"10.1109\/CNS.2016.7860482"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Barthe, G., Danezis, G., Gr\u00e9goire, B., Kunz, C., Zanella-B\u00e9guelin, S.: Verified computational differential privacy with applications to smart metering. In: 2013 IEEE 26th Computer Security Foundations Symposium, pp. 287\u2013301 (2013). https:\/\/doi.org\/10.1109\/CSF.2013.26","DOI":"10.1109\/CSF.2013.26"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Benhamouda, F., Joye, M., Libert, B.: A new framework for privacy-preserving aggregation of time-series data. ACM Trans. Inf. Syst. Secur. 18(3) (2016). https:\/\/doi.org\/10.1145\/2873069","DOI":"10.1145\/2873069"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Chan, T.-H.H., Shi, E., Song, D.: Privacy-preserving stream aggregation with fault tolerance. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 200\u2013214. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_15","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Chow, S.S.M., Li, M., Zhao, Y., Jin, W.: Sipster: settling iou privately and quickly with smart meters. In: Annual Computer Security Applications Conference, pp. 219\u2013234. ACSAC 2021, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3485832.3488029","DOI":"10.1145\/3485832.3488029"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Danezis, G., Fournet, C., Kohlweiss, M., Zanella-B\u00e9guelin, S.: Smart meter aggregation via secret-sharing. In: Proceedings of the First ACM Workshop on Smart Energy Grid Security, pp. 75\u201380. SEGS 2013, Association for Computing Machinery, New York, NY, USA (2013). https:\/\/doi.org\/10.1145\/2516930.2516944","DOI":"10.1145\/2516930.2516944"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-24178-9_11","volume-title":"Information Hiding","author":"G Danezis","year":"2011","unstructured":"Danezis, G., Kohlweiss, M., Rial, A.: Differentially private billing with rebates. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 148\u2013162. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_11"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2016.06.014","volume":"50","author":"T Dimitriou","year":"2016","unstructured":"Dimitriou, T., Awad, M.K.: Secure and scalable aggregation in the smart grid resilient against malicious entities. Ad. Hoc. Netw. 50, 58\u201367 (2016). https:\/\/doi.org\/10.1016\/j.adhoc.2016.06.014","journal-title":"Ad. Hoc. Netw."},{"key":"14_CR21","doi-asserted-by":"publisher","unstructured":"Dimitriou, T., Karame, G.: Privacy-friendly tasking and trading of energy in smart grids. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp. 652\u2013659. SAC 2013, Association for Computing Machinery, New York, NY, USA (2013). https:\/\/doi.org\/10.1145\/2480362.2480488","DOI":"10.1145\/2480362.2480488"},{"key":"14_CR22","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl\u00e4ffer, M.: Ascon PRF, MAC, and short-input MAC. Cryptology ePrint Archive, Paper 2021\/1574 (2021). https:\/\/eprint.iacr.org\/2021\/1574"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 first IEEE international conference on smart grid communications, pp. 238\u2013243. IEEE (2010)","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-319-59870-3_11","volume-title":"Information Security and Privacy","author":"K Emura","year":"2017","unstructured":"Emura, K.: Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10343, pp. 193\u2013213. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59870-3_11"},{"key":"14_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-31284-7_33","volume-title":"Applied Cryptography and Network Security","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z., Tsudik, G.: Private computation of spatial and temporal power consumption with smart meters. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 561\u2013577. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31284-7_33"},{"issue":"3","key":"14_CR26","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/S0378-7788(99)00007-9","volume":"30","author":"L Farinaccio","year":"1999","unstructured":"Farinaccio, L., Zmeureanu, R.: Using a pattern recognition approach to disaggregate the total electricity consumption in a house into the major end-uses. Energy Build. 30(3), 245\u2013259 (1999). https:\/\/doi.org\/10.1016\/S0378-7788(99)00007-9","journal-title":"Energy Build."},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management","author":"FD Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 226\u2013238. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22444-7_15"},{"key":"14_CR28","unstructured":"Giaconi, G., G\u00fcnd\u00fcz, D., Poor, H.V.: Smart meter data privacy. CoRR abs\/2009.01364 (2020). https:\/\/arxiv.org\/abs\/2009.01364"},{"issue":"12","key":"14_CR29","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/5.192069","volume":"80","author":"G Hart","year":"1992","unstructured":"Hart, G.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870\u20131891 (1992). https:\/\/doi.org\/10.1109\/5.192069","journal-title":"Proc. IEEE"},{"key":"14_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","volume-title":"Privacy Enhancing Technologies","author":"M Jawurek","year":"2011","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192\u2013210. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22263-4_11"},{"key":"14_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-31680-7_12","volume-title":"Privacy Enhancing Technologies","author":"M Jawurek","year":"2012","unstructured":"Jawurek, M., Kerschbaum, F.: Fault-tolerant privacy-preserving statistics. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 221\u2013238. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31680-7_12"},{"key":"14_CR32","unstructured":"Jawurek, M., Kerschbaum, F., Danezis, G.: Sok: privacy technologies for smart grids-a survey of options. Microsoft Res. Cambridge, UK, vol. 1, pp. 1\u201316 (2012)"},{"key":"14_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-39884-1_10","volume-title":"Financial Cryptography and Data Security","author":"M Joye","year":"2013","unstructured":"Joye, M., Libert, B.: A scalable scheme for privacy-preserving aggregation of time-series data. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 111\u2013125. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_10"},{"key":"14_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-22263-4_10","volume-title":"Privacy Enhancing Technologies","author":"K Kursawe","year":"2011","unstructured":"Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 175\u2013191. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22263-4_10"},{"key":"14_CR35","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-12280-9_20","volume-title":"Cryptology and Network Security","author":"I Leontiadis","year":"2014","unstructured":"Leontiadis, I., Elkhiyaoui, K., Molva, R.: Private and dynamic time-series data aggregation with trust relaxation. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) Cryptology and Network Security, pp. 305\u2013320. Springer International Publishing, Cham (2014)"},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 327\u2013332 (2010). https:\/\/doi.org\/10.1109\/SMARTGRID.2010.5622064","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"14_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1007\/978-3-642-31284-7_32","volume-title":"Applied Cryptography and Network Security","author":"H-Y Lin","year":"2012","unstructured":"Lin, H.-Y., Tzeng, W.-G., Shen, S.-T., Lin, B.-S.P.: A practical smart metering system supporting privacy preserving billing and load monitoring. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 544\u2013560. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31284-7_32"},{"key":"14_CR38","doi-asserted-by":"publisher","unstructured":"Molina-Markham, A., Danezis, G., Fu, K., Shenoy, P., Irwin, D.: Designing privacy-preserving smart meters with low-cost microcontrollers. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 239\u2013253. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_18","DOI":"10.1007\/978-3-642-32946-3_18"},{"issue":"6","key":"14_CR39","doi-asserted-by":"publisher","first-page":"6481","DOI":"10.1109\/TSG.2019.2906016","volume":"10","author":"MA Mustafa","year":"2019","unstructured":"Mustafa, M.A., Cleemput, S., Aly, A., Abidin, A.: A secure and privacy-preserving protocol for smart metering operational data collection. IEEE Trans. Smart Grid 10(6), 6481\u20136490 (2019). https:\/\/doi.org\/10.1109\/TSG.2019.2906016","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"14_CR40","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/TSG.2017.2673843","volume":"8","author":"J Ni","year":"2017","unstructured":"Ni, J., Zhang, K., Alharbi, K., Lin, X., Zhang, N., Shen, X.S.: Differentially private smart metering with fault tolerance and range-based filtering. IEEE Trans. Smart Grid 8(5), 2483\u20132493 (2017). https:\/\/doi.org\/10.1109\/TSG.2017.2673843","journal-title":"IEEE Trans. Smart Grid"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Prudenzi, A.: A neuron nets based procedure for identifying domestic appliances pattern-of-use from energy recordings at meter panel. In: 2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309), vol. 2, pp. 941\u2013946 (2002). https:\/\/doi.org\/10.1109\/PESW.2002.985144","DOI":"10.1109\/PESW.2002.985144"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Quinn, E.L.: Privacy and the new energy infrastructure. Available at SSRN 1370731 (2009)","DOI":"10.2139\/ssrn.1370731"},{"key":"14_CR43","doi-asserted-by":"publisher","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pp. 735\u2013746. SIGMOD 2010, Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1807167.1807247","DOI":"10.1145\/1807167.1807247"},{"key":"14_CR44","doi-asserted-by":"publisher","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 49\u201360. WPES 2011, Association for Computing Machinery, New York, NY, USA (2011). https:\/\/doi.org\/10.1145\/2046556.2046564","DOI":"10.1145\/2046556.2046564"},{"issue":"1","key":"14_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-016-0355-8","volume":"17","author":"A Rial","year":"2018","unstructured":"Rial, A., Danezis, G., Kohlweiss, M.: Privacy-preserving smart metering revisited. Int. J. Inf. Secur. 17(1), 1\u201331 (2018)","journal-title":"Int. J. Inf. Secur."},{"key":"14_CR46","doi-asserted-by":"publisher","unstructured":"Rouf, I., Mustafa, H., Xu, M., Xu, W., Miller, R., Gruteser, M.: Neighborhood watch: security and privacy analysis of automatic meter reading systems. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security. pp. 462\u2013473. CCS 2012, Association for Computing Machinery, New York, NY, USA (2012). https:\/\/doi.org\/10.1145\/2382196.2382246","DOI":"10.1145\/2382196.2382246"},{"key":"14_CR47","unstructured":"Shi, E., Chan, T.H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Proceedings NDSS, vol. 2, pp. 1\u201317 (2011)"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20974-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T20:04:18Z","timestamp":1672344258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20974-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031209734","9783031209741"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20974-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cans2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}