{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:02:35Z","timestamp":1755219755778,"version":"3.43.0"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819645657"},{"type":"electronic","value":"9789819645664"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4566-4_6","type":"book-chapter","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T23:59:29Z","timestamp":1743551969000},"page":"81-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Aided Revocable Threshold Group Signature Scheme for the Smart Grid"],"prefix":"10.1007","author":[{"given":"Xiaozhi","family":"Deng","sequence":"first","affiliation":[]},{"given":"Qinqin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yongbao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,1]]},"reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"publisher","first-page":"2858","DOI":"10.1109\/TSG.2018.2812712","volume":"10","author":"X Wang","year":"2019","unstructured":"Wang, X., Blaabjerg, F.: Harmonic stability in power electronic-based power systems: concept, modeling, and analysis. IEEE Trans. Smart Grid 10(3), 2858\u20132870 (2019). https:\/\/doi.org\/10.1109\/TSG.2018.2812712","journal-title":"IEEE Trans. Smart Grid"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Su, H., Liao, P., Zhou, F., Yi, S., Yang, Q.: Research on intelligent defect identification model of power grid edge side equipment based on edge computing. Electric Power Inf. Commun. Technol. 19(04), 31\u201337 (2021). (in Chinese), https:\/\/doi.org\/10.16543\/j.2095-641x.electric.power.ict.2021.04.005","DOI":"10.16543\/j.2095-641x.electric.power.ict.2021.04.005"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Zhu, L., You, S., Yin, H., Zhao, Y., Li, F., Yao, W.: FNET\/GridEye: a tool for situational awareness of large power interconnection grids. In: IEEE PES Innovative Smart Grid Technologies Europe, pp. 379\u2013383. IEEE, The Hague, Netherlands (2020). https:\/\/doi.org\/10.1109\/ISGT-Europe47291.2020.9248857","DOI":"10.1109\/ISGT-Europe47291.2020.9248857"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Al-Gburi, A., Al-Hasnawi, A., Lilien, L.: Differentiating security from privacy in Internet of Thigs: A survey of selected threats and controls. In: Daimi, K. (ed.) Computer and Network Security Essentials, pp. 153\u2013172. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-58424-9_9","DOI":"10.1007\/978-3-319-58424-9_9"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Chen, Y., Wang, W., Sun, L.: Smart grid terminal access authentication scheme based on multiple encryption algorithms. Ind. Technol. Innov. 9(4), 93\u2013101 (2022). (in Chinese), https:\/\/doi.org\/10.14103\/j.issn.2095-8412.2022.08.012","DOI":"10.14103\/j.issn.2095-8412.2022.08.012"},{"issue":"9","key":"6_CR6","doi-asserted-by":"publisher","first-page":"9424","DOI":"10.1109\/TII.2022.3228688","volume":"19","author":"Q Su","year":"2023","unstructured":"Su, Q., Zhang, R., Xue, R., Sun, Y., Gao, S.: Distributed attribute-based signature with attribute dynamic update for smart grid. IEEE Trans. Industr. Inf. 19(9), 9424\u20139435 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3228688","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"19","key":"6_CR7","doi-asserted-by":"publisher","first-page":"31249","DOI":"10.1109\/JIOT.2024.3419161","volume":"11","author":"F Zhu","year":"2024","unstructured":"Zhu, F., Guo, D., Abuadbba, S., Yi, X., Luo, J., Kumari, S.: Lightweight verifiable privacy-preserving data aggregation for smart grids. IEEE Internet Things J. 11(19), 31249\u201331259 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3419161","journal-title":"IEEE Internet Things J."},{"issue":"15","key":"6_CR8","doi-asserted-by":"publisher","first-page":"25520","DOI":"10.1109\/JIOT.2024.3356593","volume":"11","author":"J Zhang","year":"2024","unstructured":"Zhang, J., Wei, J.: PFDAM: Privacy-Preserving fine-grained data aggregation scheme supporting multifunctionality in smart grid. IEEE Internet Things J. 11(15), 25520\u201325533 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3356593","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"6_CR9","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/TGCN.2023.3265608","volume":"7","author":"A Tomar","year":"2023","unstructured":"Tomar, A., Tripathi, S., Arivarasan, K.: A blockchain-based certificateless aggregate signature scheme for fog-enabled smart grid environment. IEEE Trans. Green Commun. Netw. 7(4), 1892\u20131905 (2023). https:\/\/doi.org\/10.1109\/TGCN.2023.3265608","journal-title":"IEEE Trans. Green Commun. Netw."},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1109\/TDSC.2022.3169952","volume":"20","author":"GK Verma","year":"2023","unstructured":"Verma, G.K., Gope, P., Saxena, N., Kumar, N.: CB-DA: Lightweight and escrow-free certificate-based data aggregation for smart grid. IEEE Trans. Depend. Secure Comput. 20(3), 2011\u20132024 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3169952","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"5","key":"6_CR11","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen, M., Liu, H., Zhu, L., Xu, K., Yu, H., Du, X.: Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE J. Sel. Areas Commun. 38(5), 942\u2013954 (2020). https:\/\/doi.org\/10.1109\/JSAC.2020.2980916","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"6_CR12","doi-asserted-by":"publisher","first-page":"2409","DOI":"10.1109\/TNSM.2022.3146929","volume":"19","author":"L Xue","year":"2022","unstructured":"Xue, L., Huang, H., Xiao, F., Wang, W.: A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums. IEEE Trans. Netw. Serv. Manage. 19(3), 2409\u20132420 (2022). https:\/\/doi.org\/10.1109\/TNSM.2022.3146929","journal-title":"IEEE Trans. Netw. Serv. Manage."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4566-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T08:33:27Z","timestamp":1754555607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4566-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819645657","9789819645664"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4566-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/ml4cs2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}