{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:13:24Z","timestamp":1742915604901,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238678"},{"type":"electronic","value":"9783319238685"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23868-5_34","type":"book-chapter","created":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T06:50:50Z","timestamp":1440831050000},"page":"467-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preserving Metering Protocol in Smart Grids"],"prefix":"10.1007","author":[{"given":"Dilan","family":"Mert","sequence":"first","affiliation":[]},{"given":"Mehmet Ulvi","family":"\u015eim\u015fek","sequence":"additional","affiliation":[]},{"given":"Suat","family":"\u00d6zdemir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Metke, A.R., Ekl, R.L.: Security Technology for Smart Grid Networks. IEEE Transactions on Smart Grid 1(1) (June 2010)","DOI":"10.1109\/TSG.2010.2046347"},{"issue":"1","key":"34_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MSP.2010.49","volume":"8","author":"M. Hadley","year":"2010","unstructured":"Hadley, M., Lu, N., Deborah, A.: Smart-Grid Security Issues. IEEE Security and Privacy\u00a08(1), 81\u201385 (2010)","journal-title":"IEEE Security and Privacy"},{"issue":"9","key":"34_CR3","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R. Lu","year":"2012","unstructured":"Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications. IEEE Transactions on Parallel and Distributed Systems\u00a023(9), 1621\u20131631 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Yan, Y., Qian, Y., Sharif, H., Tipper, D.: A Survey on Cyber Security for Smart Grid Communications. IEEE Communications Surveys & Tutorials\u00a014(4) (Fourth Quarter 2012)","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Komninos, N., Philippou, E., Pitsillides, A.: Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures (2013)","DOI":"10.1109\/COMST.2014.2320093"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1016\/j.comnet.2013.02.018","volume":"57","author":"C. Rottondi","year":"2013","unstructured":"Rottondi, C., Verticale, G., Capone, A.: Privacy-Preserving smart metering with multiple data consumers. Computer Networks, Elsevier\u00a057, 1699\u20131713 (2013)","journal-title":"Computer Networks, Elsevier"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Rottondi, C., Verticale, G., Krau\u00df, C.: Distributed Privacy-Preserving Aggregation of Metering Data in Smart Grids (July 2013)","DOI":"10.1109\/JSAC.2013.130716"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Erkin, Z.: Privacy-Preserving Data Aggregation in Smart Metering Systems (February 2013)","DOI":"10.1109\/MSP.2012.2228343"},{"key":"34_CR9","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Comm. ACM\u00a022, 612\u2013613 (1979)","journal-title":"Comm. ACM"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1016\/j.adhoc.2009.04.009","volume":"7","author":"N. Li","year":"2009","unstructured":"Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Networks\u00a07, 1501\u20131514 (2009)","journal-title":"Ad Hoc Networks"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal Privacy in Wireless Sensor Networks. ACM Transactions on Sensor Networks 5(4), Article 28 (November 2009)","DOI":"10.1145\/1614379.1614380"},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"3604","DOI":"10.1016\/j.comnet.2011.07.010","volume":"55","author":"W. Wang","year":"2011","unstructured":"Wang, W., Xu, Y., Khanna, M.: A survey on the communication architectures in smart grid. Computer Networks\u00a055, 3604\u20133629 (2011)","journal-title":"Computer Networks"},{"issue":"3\u20134","key":"34_CR13","first-page":"211","volume":"9","author":"C. Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science\u00a09(3\u20134), 211\u2013407 (2014)","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"34_CR14","unstructured":"Bogdanov, D.: How to securely perform computations on secret-shared data. Master\u2019s thesis, University of Tartu (2007)"},{"key":"34_CR15","unstructured":"Rosulek, M.: Shamir Secret Sharing Alternative Proof of Security (January 9, 2015). \n                    \n                      http:\/\/www.tcs.hut.fi\/Studies\/T-79.159\/2004\/slides\/L9.pdf\n                    \n                    \n                   (accessed on June 11, 2015)"},{"key":"34_CR16","unstructured":"Lipmaa, H.: Lecture 9: Secret Sharing, Threshold Cryptography, MPC (March 24, 2004). \n                    \n                      http:\/\/web.engr.oregonstate.edu\/~rosulekm\/crypto\/shamir-alt-proof.pdf\n                    \n                    \n                   (accessed on June 11, 2015)"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Rottondi, C., Verticale, G.: Privacy-Friendly Appliance Load Scheduling in Smart Grids. In: Smart Grid Communications (2013)","DOI":"10.1109\/SmartGridComm.2013.6687994"},{"key":"34_CR18","unstructured":"Ozdemir, S.: Secure Data Aggregation in Wireless Sensor Networks via Homomorphic Encription. Journal of the Faculty of Engineering and Architecture of Gazi University, Cilt 23, No 2, 365\u2013373 (2008)"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., Liu, P.: Secure Information Aggregation for Smart Grids Using Homomorphic Encryption. In: Smart Grid Communications, pp. 327\u2013332 (2010)","DOI":"10.1109\/SMARTGRID.2010.5622064"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23868-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T05:59:47Z","timestamp":1567058387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23868-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238678","9783319238685"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23868-5_34","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"15 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}