{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:42:03Z","timestamp":1742985723529,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609567"},{"type":"electronic","value":"9789819609574"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0957-4_12","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:05Z","timestamp":1738272845000},"page":"223-235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SePEnTra: A Secure and\u00a0Privacy-Preserving Energy Trading Mechanism in\u00a0the\u00a0Transactive Energy Market"],"prefix":"10.1007","author":[{"given":"Rumpa","family":"Dasgupta","sequence":"first","affiliation":[]},{"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[]},{"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Dowsley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"unstructured":"Dasgupta, R.: Cyber Attacks and Countermeasures in Transactive Energy Market-based Microgrid Systems (2024)","key":"12_CR1"},{"doi-asserted-by":"crossref","unstructured":"Dasgupta, R., Sakzad, A., Rudolph, C.: Cyber attacks in transactive energy market-based microgrid systems. Energies 14 (2021)","key":"12_CR2","DOI":"10.3390\/en14041137"},{"doi-asserted-by":"publisher","unstructured":"Dayaratne, T.T., Jaigirdar, F.T., Dasgupta, R., Sakzad, A., Rudolph, C.: Improving cybersecurity situational awareness in smart grid environments, pp. 115\u2013134. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-20360-2_5","key":"12_CR3","DOI":"10.1007\/978-3-031-20360-2_5"},{"key":"12_CR4","volume":"82","author":"Z He","year":"2022","unstructured":"He, Z., Khazaei, J., Moazeni, F., Freihaut, J.D.: Detection of false data injection attacks leading to line congestions using neural networks. Sustain. Urban Areas 82, 103861 (2022)","journal-title":"Sustain. Urban Areas"},{"doi-asserted-by":"publisher","unstructured":"Dasgupta, R., Sakzad, A., Rudolph, C.: Impact analysis of false data injection attacks in transactive energy market-based micro-grid systems. In: IEEE PES Asia (ISGT Asia), vol. 2021, pp. 1\u20135 (2021). https:\/\/doi.org\/10.1109\/ISGTAsia49270.2021.9715633","key":"12_CR5","DOI":"10.1109\/ISGTAsia49270.2021.9715633"},{"doi-asserted-by":"publisher","unstructured":"Dasgupta, R., Sakzad, A., Rudolph, C., Dowsley, R.: Fdias on hybrid trading transactive energy markets: attacks, impacts, and prevention. In: IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE), pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/ISGTEUROPE56780.2023.10407432","key":"12_CR6","DOI":"10.1109\/ISGTEUROPE56780.2023.10407432"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/TSG.2015.2412091","volume":"7","author":"Y Gong","year":"2016","unstructured":"Gong, Y., Cai, Y., Guo, Y., Fang, Y.: A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans. Smart Grid 7, 1304\u20131313 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"12_CR8","volume":"50","author":"H Habibzadeh","year":"2019","unstructured":"Habibzadeh, H., Nussbaum, B.H., Anjomshoa, F., Kantarci, B., Soyata, T.: A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Urban Areas 50, 101660 (2019)","journal-title":"Sustain. Urban Areas"},{"doi-asserted-by":"publisher","unstructured":"Laszka, A., Dubey, A., Walker, M., Schmidt, D.: Providing privacy, safety, and security in IoT-based transactive energy systems using distributed ledgers (2017). https:\/\/doi.org\/10.1145\/3131542.3131562","key":"12_CR9","DOI":"10.1145\/3131542.3131562"},{"unstructured":"Kvaternik, K., et al.: Privacy-preserving platform for transactive energy systems (2017)","key":"12_CR10"},{"doi-asserted-by":"crossref","unstructured":"Samy, A., Yu, H., Zhang, H., Zhang, G.: Spets: secure and privacy-preserving energy trading system in microgrid. Sensors 21 (2021)","key":"12_CR11","DOI":"10.3390\/s21238121"},{"key":"12_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.116208","volume":"282","author":"S Saha","year":"2021","unstructured":"Saha, S., Ravi, N., Hreinsson, K., Baek, J., Scaglione, A., Johnson, N.G.: A secure distributed ledger for transactive energy: the electron volt exchange (eve) blockchain. Appl. Energy 282, 116208 (2021)","journal-title":"Appl. Energy"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"3390","DOI":"10.1109\/TSG.2021.3063960","volume":"12","author":"MH Ullah","year":"2021","unstructured":"Ullah, M.H., Park, J.-D.: Peer-to-peer energy trading in transactive markets considering physical network constraints. IEEE Trans. Smart Grid 12, 3390\u20133403 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"unstructured":"Lu, Y., Lian, J., Zhu, M., Ma, K.: Transactive energy system deployment over insecure communication links (2020)","key":"12_CR14"},{"doi-asserted-by":"publisher","unstructured":"Lu, Y., Lian, J., Zhu, M.: Privacy-preserving transactive energy system. In: 2020 American Control Conference, pp. 3005\u20133010 (2020). https:\/\/doi.org\/10.23919\/ACC45564.2020.9147486","key":"12_CR15","DOI":"10.23919\/ACC45564.2020.9147486"},{"unstructured":"Escudero, D.: An introduction to secret-sharing-based secure multiparty computation (2022). https:\/\/eprint.iacr.org\/2022\/062","key":"12_CR16"},{"key":"12_CR17","first-page":"129","volume-title":"CRYPTO 1991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/TSTE.2020.3026611","volume":"12","author":"M Khorasany","year":"2021","unstructured":"Khorasany, M., Najafi-Ghalelou, A., Razzaghi, R.: A framework for joint scheduling and power trading of prosumers in transactive markets. IEEE Trans. Sustain. Energy 12, 955\u2013965 (2021)","journal-title":"IEEE Trans. Sustain. Energy"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"4646","DOI":"10.1109\/TIE.2019.2931229","volume":"67","author":"M Khorasany","year":"2020","unstructured":"Khorasany, M., Mishra, Y., Ledwich, G.: A decentralized bilateral energy trading system for peer-to-peer electricity markets. IEEE Trans. Ind. Electron. 67, 4646\u20134657 (2020)","journal-title":"IEEE Trans. Ind. Electron."},{"unstructured":"Dasgupta, R., Sakzad, A., Rudolph, C., Dowsley, R.: SePEnTra: a secure and privacy-preserving energy trading mechanisms in transactive energy market (2023). https:\/\/arxiv.org\/abs\/2304.06179","key":"12_CR20"},{"doi-asserted-by":"crossref","unstructured":"Khorasany, M., Mishra, Y., Ledwich, G.: Hybrid trading scheme for peer-to-peer energy trading in transactive energy markets. IET Gener. Transm. Distrib. (2020)","key":"12_CR21","DOI":"10.1049\/iet-gtd.2019.1233"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/0022-314X(80)90084-0","volume":"12","author":"MO Rabin","year":"1980","unstructured":"Rabin, M.O.: Probabilistic algorithm for testing primality. J. Number Theory 12, 128\u2013138 (1980)","journal-title":"J. Number Theory"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0957-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:11Z","timestamp":1738272851000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0957-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609567","9789819609574"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0957-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}