{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:42:56Z","timestamp":1743043376264,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811322051"},{"type":"electronic","value":"9789811322068"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2206-8_33","type":"book-chapter","created":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T10:43:21Z","timestamp":1536403401000},"page":"401-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Comparison Method of Massive Power Consumption Information Collection Test Data Based on Improved Merkle Tree"],"prefix":"10.1007","author":[{"given":"Enguo","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Fangbin","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Chaoliang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,9]]},"reference":[{"issue":"1","key":"33_CR1","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3969\/j.issn.1001-1390.2015.01.002","volume":"52","author":"L Shen","year":"2015","unstructured":"Shen, L., Liu, X., Liu, Y., Dong, L.: Reliability compliance test for electrical energy data acquisition equipments. Electr. Measur. Instrum. 52(1), 8\u201312 (2015). https:\/\/doi.org\/10.3969\/j.issn.1001-1390.2015.01.002","journal-title":"Electr. Measur. Instrum."},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.7500\/aeps20130617005","volume":"2","author":"J Hu","year":"2014","unstructured":"Hu, J., Zhu, E., Du, X., Du, S.: Application status and development trend of power consumption information collection system. Autom. Electr. Power Syst. 2, 131\u2013135 (2014). https:\/\/doi.org\/10.7500\/aeps20130617005","journal-title":"Autom. Electr. Power Syst."},{"issue":"4","key":"33_CR3","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.13335\/j.1000-3673.pst.2016.04.044","volume":"40","author":"J Lu","year":"2016","unstructured":"Lu, J., Li, Z., Zhu, Y., Xu, Z.: Communication bandwidth prediction for information gathering services in power distribution and utilization of smart grid. Power Syst. Technol. 40(4), 1277\u20131282 (2016). https:\/\/doi.org\/10.13335\/j.1000-3673.pst.2016.04.044","journal-title":"Power Syst. Technol."},{"issue":"11","key":"33_CR4","doi-asserted-by":"publisher","first-page":"3128","DOI":"10.13335\/j.1000-3673.pst.2015.11.017","volume":"39","author":"X Wang","year":"2015","unstructured":"Wang, X., Shi, Y., Zhang, J., Liang, B., Cheng, C.: Computation services and applications of electricity big data based on Hadoop. Power Syst. Technol. 39(11), 3128\u20133133 (2015). https:\/\/doi.org\/10.13335\/j.1000-3673.pst.2015.11.017","journal-title":"Power Syst. Technol."},{"issue":"2","key":"33_CR5","first-page":"417","volume":"37","author":"F Li","year":"2013","unstructured":"Li, F., Chen, Y., Zhang, S., Hu, T.: Research on construction of unified database of large-scale power grid. Power Syst. Technol. 37(2), 417\u2013424 (2013)","journal-title":"Power Syst. Technol."},{"issue":"4","key":"33_CR6","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.13335\/j.1000-3673.pst.2015.04.029","volume":"39","author":"W Shi","year":"2015","unstructured":"Shi, W., Huang, L., Xu, J., Gu, Y., Jiang, H., Zhang, J.: Fault detection, identification and location based on measurement data from finite synchronized Phasor measurement. Power Syst. Technol. 39(4), 1067\u20131074 (2015). https:\/\/doi.org\/10.13335\/j.1000-3673.pst.2015.04.029","journal-title":"Power Syst. Technol."},{"key":"33_CR7","first-page":"2679","volume":"10","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Cai, G.: Study on hash function based on random function. Comput. Eng. Des. 10, 2679\u20132683 (2015)","journal-title":"Comput. Eng. Des."},{"issue":"1","key":"33_CR8","doi-asserted-by":"publisher","first-page":"266","DOI":"10.3969\/j.issn.1000-3428.2015.01.050","volume":"41","author":"P Xu","year":"2015","unstructured":"Xu, P., Liu, S., Lan, J., Xiao, D.: An improved segment hash algorithm. Comput. Eng. 41(1), 266\u2013269 (2015). https:\/\/doi.org\/10.3969\/j.issn.1000-3428.2015.01.050","journal-title":"Comput. Eng."},{"issue":"6A","key":"33_CR9","doi-asserted-by":"publisher","first-page":"332","DOI":"10.11896\/j.issn.1002-137X.2016.6A.079","volume":"43","author":"Q Hu","year":"2016","unstructured":"Hu, Q., Luo, Y., Yin, M., Qu, X.: Method of duplicate removal on alert logs based on attributes hashing. Comput. Sci. 43(6A), 332\u2013334 (2016). https:\/\/doi.org\/10.11896\/j.issn.1002-137X.2016.6A.079","journal-title":"Comput. Sci."},{"key":"33_CR10","volume-title":"Data Structure (C Language Version)","author":"W Yan","year":"2011","unstructured":"Yan, W., Wu, W.: Data Structure (C Language Version). Tsinghua University Press, Beijing (2011)"},{"issue":"3","key":"33_CR11","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s00778-016-0420-y","volume":"25","author":"R Al-Harbi","year":"2016","unstructured":"Al-Harbi, R., Abdelaziz, I., Kalnis, P., Mamoulis, N., Ebrahim, Y., Sahli, M.: Accelerating SPARQL queries by exploiting hash-based locality and adaptive partitioning. VLDB J. 25(3), 355\u2013380 (2016). https:\/\/doi.org\/10.1007\/s00778-016-0420-y","journal-title":"VLDB J."},{"issue":"6","key":"33_CR12","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.3969\/j.issn.1001-3695.2016.06.021","volume":"33","author":"Y Cao","year":"2016","unstructured":"Cao, Y., Liu, Y., Jia, X., Wang, D.: Image spam filtering with improved LSH algorithm. Appl. Res. Comput. 33(6), 1693\u20131696 (2016). https:\/\/doi.org\/10.3969\/j.issn.1001-3695.2016.06.021","journal-title":"Appl. Res. Comput."},{"issue":"3","key":"33_CR13","first-page":"65","volume":"40","author":"H Zhang","year":"2017","unstructured":"Zhang, H., Li, Y., Ma, F.: Merkle hash tree based security authentication scheme for WBSN. Mod. Electron. Tech. 40(3), 65\u201370 (2017)","journal-title":"Mod. Electron. Tech."},{"issue":"11","key":"33_CR14","doi-asserted-by":"publisher","first-page":"122","DOI":"10.14016\/j.cnki.jgzz.2016.11.122","volume":"37","author":"F Xie","year":"2016","unstructured":"Xie, F.: Trusted cloud computing information security certificate method based on Merkle hash tree. Laser J. 37(11), 122\u2013127 (2016). https:\/\/doi.org\/10.14016\/j.cnki.jgzz.2016.11.122","journal-title":"Laser J."},{"issue":"14","key":"33_CR15","doi-asserted-by":"publisher","first-page":"98","DOI":"10.3778\/j.issn.1002-8331.2012.14.021","volume":"48","author":"F Liu","year":"2012","unstructured":"Liu, F., Cai, Y., Wang, C., Yan, C.: Research of traverse and application of Merkle authentication tree. Comput. Eng. Appl. 48(14), 98\u2013101 (2012). https:\/\/doi.org\/10.3778\/j.issn.1002-8331.2012.14.021","journal-title":"Comput. Eng. Appl."},{"key":"33_CR16","first-page":"1","volume":"4","author":"L Chen","year":"2017","unstructured":"Chen, L., Qiu, L.: A verifiable ciphertext retrieval scheme based on Merkle hash tree. Netinfo Secur. 4, 1\u20138 (2017)","journal-title":"Netinfo Secur."},{"key":"33_CR17","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3969\/j.issn.1007-1423-B.2011.04.019","volume":"4","author":"H Li","year":"2011","unstructured":"Li, H.: Application of MD5 hash encryption algorithm in SQL server 2005. Mod. Comput. 4, 60\u201361 (2011). https:\/\/doi.org\/10.3969\/j.issn.1007-1423-B.2011.04.019","journal-title":"Mod. Comput."},{"issue":"6","key":"33_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3969\/j.issn.1000-386X.2010.06.012","volume":"27","author":"J Ge","year":"2010","unstructured":"Ge, J., Li, J.: A new encryption algorithm for digital images based on MD5 value. Comput. Appl. Softw. 27(6), 35\u201338 (2010). https:\/\/doi.org\/10.3969\/j.issn.1000-386X.2010.06.012","journal-title":"Comput. Appl. Softw."},{"issue":"7","key":"33_CR19","doi-asserted-by":"publisher","first-page":"149","DOI":"10.3969\/j.issn.1003-3254.2015.07.027","volume":"24","author":"B Xiao","year":"2015","unstructured":"Xiao, B., Zheng, Y., Lonf, J., Guo, P.: QR code design of information security based on Rijndael encryption algorithm and SHA512 encryption algorithm. Comput. Syst. Appl. 24(7), 149\u2013154 (2015). https:\/\/doi.org\/10.3969\/j.issn.1003-3254.2015.07.027","journal-title":"Comput. Syst. Appl."},{"issue":"3","key":"33_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3969\/j.issn.1007-757X.2017.03.014","volume":"33","author":"Y Aizezi","year":"2017","unstructured":"Aizezi, Y., Wumaier, A.: Security payment scheme based on symmetric encryption and hash function in e-commerce. Microcomput. Appl. 33(3), 46\u201348 (2017). https:\/\/doi.org\/10.3969\/j.issn.1007-757X.2017.03.014","journal-title":"Microcomput. Appl."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2206-8_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:11:32Z","timestamp":1710249092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-13-2206-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811322051","9789811322068"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2206-8_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}