{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:05:44Z","timestamp":1771668344214,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642326448","type":"print"},{"value":"9783642326455","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32645-5_76","type":"book-chapter","created":{"date-parts":[[2012,8,21]],"date-time":"2012-08-21T04:05:43Z","timestamp":1345521943000},"page":"608-617","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Privacy-Enhanced AMI System Using Searchable and Homomorphic Encryption Techniques"],"prefix":"10.1007","author":[{"given":"Changwhan","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hyunsik","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Byunghee","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"76_CR1","unstructured":"IEC smart gird standardization roadmap, SG3 (2010)"},{"key":"76_CR2","unstructured":"NIST framework and roadmap for smart grid interoperability standards, release 1.0, NIST (2010)"},{"key":"76_CR3","unstructured":"Research on searchable encryption system, ETRI (2008)"},{"key":"76_CR4","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data bank and privacy homomorphisms. In: Proceedings of the 19th Annual Symposium on Foundations of Secure Computation - FSC, pp. 169\u2013180. Academic Press (1978)"},{"key":"76_CR5","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"76_CR6","unstructured":"Technical report and view of Homomorphic Encryption, NIPA (2011)"},{"key":"76_CR7","doi-asserted-by":"crossref","unstructured":"Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. Proceedings of EURASIP Journal on Information Security (2007)","DOI":"10.1186\/1687-417X-2007-013801"},{"key":"76_CR8","unstructured":"Single phase meters & Metering solutions, Elster, \n                    \n                      http:\/\/www.elstersolutions.com\/en\/single_phase.html"},{"key":"76_CR9","unstructured":"AMI & AMR, Ember, \n                    \n                      http:\/\/www.ember.com\/applications_amr.html"},{"key":"76_CR10","unstructured":"CENTRON Residential Meter, Itron, \n                    \n                      https:\/\/www.itron.com\/na\/productsAndServices\/Pages\/CENTRON.aspx"},{"key":"76_CR11","unstructured":"Itron OpenWay CENTRON Smart Meter, ARM, \n                    \n                      http:\/\/mobile.arm.com\/markets\/embedded\/15421.php"},{"key":"76_CR12","unstructured":"MAXsys E850 Elite Advanced Metering, Landis+Gyr, \n                    \n                      http:\/\/www.landisgyr.com\/na\/en\/pub\/products_na.cfm?eventProducts=products.ProductDetails&ID=249&catID=84"},{"key":"76_CR13","unstructured":"Smart Meter, BYUCKSAN Power, \n                    \n                      http:\/\/www.bspower.co.kr\/en\/smartmeter.do"},{"key":"76_CR14","doi-asserted-by":"crossref","unstructured":"Ryu, E.K., Takagi, T.: Efficient Conjunctive Keyword-Searchable Encryption. In: Proceeding of AINAW (2007)","DOI":"10.1109\/AINAW.2007.166"},{"key":"76_CR15","unstructured":"Intrinsic-ID\u2019s AES core Hardware\/Software Specification, intrinsic ID, \n                    \n                      http:\/\/www.intrinsic-id.com\/aes.htm"},{"key":"76_CR16","unstructured":"Varchola, M.: FPGA Based True Random Number Generators for Embedded Cryptographic Applications, Technical University of Kosice (2009)"},{"key":"76_CR17","unstructured":"Benchmark with ARM Cortex-M0, Real Time Logic, \n                    \n                      http:\/\/sharkssl.com\/benchmark\/Cortex-M0\/"},{"key":"76_CR18","unstructured":"Guide for using cryptography algorism and key length, KISA (2010)"}],"container-title":["Lecture Notes in Computer Science","Convergence and Hybrid Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32645-5_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:09:57Z","timestamp":1558300197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32645-5_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642326448","9783642326455"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32645-5_76","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}