{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T01:10:01Z","timestamp":1746407401291,"version":"3.40.4"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,10,5]],"date-time":"2014-10-05T00:00:00Z","timestamp":1412467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s11276-014-0824-9","type":"journal-article","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T16:01:25Z","timestamp":1412438485000},"page":"871-881","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid"],"prefix":"10.1007","volume":"21","author":[{"given":"Majid","family":"Bayat","sequence":"first","affiliation":[]},{"given":"Hamid Reza","family":"Arkian","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"824_CR1","unstructured":"(2007). A systems view of the modern grid. In U.S. Department of Energy (DOE) National Energy Technology Laboratory (NETL)."},{"key":"824_CR2","unstructured":"(2008). The smart grid: An introduction. In The U.S. Department of Energy, Tech. Rep. http:\/\/energy.gov\/oe\/downloads\/"},{"key":"824_CR3","unstructured":"(2010). Smart grid cyber security strat egy and requirements. In DRAFT NI-STIR 7628."},{"key":"824_CR4","unstructured":"(2012). Application of automated controls for voltage and reactive power management\u2014Initial results. In The U.S. Department of Energy, Tech. Rep. https:\/\/www.smartgrid.gov\/document\/application-reactive-power-management-initial-results"},{"key":"824_CR5","unstructured":"(2012). Demand reductions from the application of advanced metering infrastructure, pricing programs, and customer-based systems\u2014Initial results. In The U.S. Department of Energy, Tech. Rep. https:\/\/www.smartgrid.gov\/document\/demand-reductions-application-advanced-metering-infrastructure-pricing-programs-and-custom"},{"key":"824_CR6","unstructured":"(2012). Operations and maintenance savings from advanced metering infrastructure initial results. In The U.S. Department of Energy, Tech. Rep. https:\/\/www.smartgrid.gov\/document\/operations-and-maintenance-savings-advanced-metering-infrastructure-initial-results"},{"key":"824_CR7","unstructured":"(2012). Reliability improvements from the application of distribution automation technologies\u2014Initial results. In The U.S. Department of Energy, Tech. Rep., https:\/\/www.smartgrid.gov\/document\/reliability-improvements-automation-technologies-initial-results"},{"key":"824_CR8","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In C. S. Laih (Ed.), Advances in cryptology-ASIACRYPT 2003 (pp. 452\u2013473). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"824_CR9","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007. SP\u201907. IEEE, pp. 321\u2013334.","DOI":"10.1109\/SP.2007.11"},{"key":"824_CR10","doi-asserted-by":"crossref","unstructured":"Bobba, R., Khurana, H., AlTurki, M., & Ashraf, F. (2009). Pbes: A policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th international symposium on information, computer, and communications security, ACM, pp. 262\u2013275.","DOI":"10.1145\/1533057.1533093"},{"key":"824_CR11","doi-asserted-by":"crossref","unstructured":"Boneh, D., & Franklin, M. (2001). Identity-based encryption from the weil pairing. In Advances in CryptologyCRYPTO 2001. Springer, pp. 213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"824_CR12","unstructured":"Doshi, N., & Jinwala, D. C. (2013). Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Security and Communication Networks."},{"issue":"4","key":"824_CR13","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","volume":"2","author":"MM Fouda","year":"2011","unstructured":"Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011). A lightweight message authentication scheme for smart grid communications. IEEE Transactions on Smart Grid, 2(4), 675\u2013685.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"824_CR14","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security, ACM, pp 89\u201398.","DOI":"10.1145\/1180405.1180418"},{"key":"824_CR15","doi-asserted-by":"crossref","unstructured":"Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption. In L. Aceto, I. Damg\u00e5rd, L. A. Goldberg, M. M. Halld\u00f3rsson, A. Ing\u00f3lfsd\u00f3ttir, & I. Walukiewicz (Eds.), Automata, languages and programming (pp. 579\u2013591). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-70583-3_47"},{"issue":"11","key":"824_CR16","doi-asserted-by":"crossref","first-page":"2171","DOI":"10.1109\/TPDS.2012.61","volume":"24","author":"J Hur","year":"2013","unstructured":"Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171\u20132180.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"7","key":"824_CR17","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur, J., & Noh, D. K. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems, 22(7), 1214\u20131221.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"824_CR18","doi-asserted-by":"crossref","unstructured":"Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W. (2009). Mediated ciphertext-policy attribute-based encryption and its application. In H. Y. Youm & M. Yung (Eds.), Information security applications (pp 309\u2013323). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-10838-9_23"},{"key":"824_CR19","first-page":"179","volume":"7","author":"A Kapadia","year":"2007","unstructured":"Kapadia, A., Tsang, P. P., & Smith, S. W. (2007). Attribute-based publishing with hidden credentials and hidden policies. NDSS, 7, 179\u2013192.","journal-title":"NDSS"},{"key":"824_CR20","doi-asserted-by":"crossref","unstructured":"Khurana, H., Bobba, R., Yardley, T., Agarwal, P., & Heine, E. (2010). Design principles for power grid cyber-infrastructure authentication protocols. In System Sciences (HICSS), 2010 43rd Hawaii International Conference on, IEEE, pp. 1\u201310.","DOI":"10.1109\/HICSS.2010.136"},{"issue":"11","key":"824_CR21","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCOM.2010.5621968","volume":"48","author":"YJ Kim","year":"2010","unstructured":"Kim, Y. J., Thottan, M., Kolesnikov, V., & Lee, W. (2010). A secure decentralized data-centric information infrastructure for smart grid. IEEE Communications Magazine, 48(11), 58\u201365.","journal-title":"IEEE Communications Magazine"},{"key":"824_CR22","doi-asserted-by":"crossref","unstructured":"Li, D., Aung, Z., Williams, J., & Sanchez, A. (2014a). P2dr: Privacy-preserving demand response system in smart grids. In Computing, Networking and Communications (ICNC), 2014 International conference on, IEEE, pp 41\u201347.","DOI":"10.1109\/ICCNC.2014.6785302"},{"issue":"3","key":"824_CR23","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1080\/17445760.2013.851677","volume":"29","author":"D Li","year":"2014","unstructured":"Li, D., Aung, Z., Williams, J. R., & Sanchez, A. (2014b). No peeking: Privacy-preserving demand response system in smart grids. International Journal of Parallel, Emergent and Distributed Systems, 29(3), 290\u2013315.","journal-title":"International Journal of Parallel, Emergent and Distributed Systems"},{"key":"824_CR24","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., & Liu, P. (2010). Secure information aggregation for smart grids using homomorphic encryption. In Smart Grid Communications (SmartGridComm), 2010 First IEEE international conference on, IEEE, pp. 327\u2013332.","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"824_CR25","doi-asserted-by":"crossref","unstructured":"Maurer, U. (2009). Unifying zero-knowledge proofs of knowledge. In B. Preneel (Ed.), Progress in cryptology-AFRICACRYPT 2009 (pp. 272\u2013286). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-02384-2_17"},{"key":"824_CR26","doi-asserted-by":"crossref","unstructured":"Nishide, T., Yoneyama, K., & Ohta, K. (2008). Attribute-based encryption with partially hidden encryptor-specified access structures. In S. M. Bellovin, R. Gennaro, A. Keromytis, & M. Yung (Eds.), Applied cryptography and network security (pp. 111\u2013129). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-68914-0_7"},{"issue":"3","key":"824_CR27","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309\u2013329.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"824_CR28","doi-asserted-by":"crossref","unstructured":"Rao, Y.S., & Dutta, R. (2014). Dynamic ciphertext-policy attribute-based encryption for expressive access policy. In R. Natarajan (Ed.), Distributed computing and internet technology (pp. 275\u2013286). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-319-04483-5_28"},{"issue":"15","key":"824_CR29","doi-asserted-by":"crossref","first-page":"3604","DOI":"10.1016\/j.comnet.2011.07.010","volume":"55","author":"W Wang","year":"2011","unstructured":"Wang, W., Xu, Y., & Khanna, M. (2011). A survey on the communication architectures in smart grid. Computer Networks, 55(15), 3604\u20133629.","journal-title":"Computer Networks"},{"key":"824_CR30","doi-asserted-by":"crossref","unstructured":"Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In D. Catalano, N. Fazio, R. Gennaro, & A. Nicolosi (Eds.), Public Key Cryptography-PKC 2011 (pp. 53\u201370). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"824_CR31","unstructured":"Yu, S., Ren, K., & Lou, W. (2008). Attribute-based content distribution with hidden policy. In Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on, IEEE, pp. 39\u201344."},{"key":"824_CR32","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security. ACM, pp. 261\u2013270.","DOI":"10.1145\/1755688.1755720"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0824-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-014-0824-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0824-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:39:19Z","timestamp":1746405559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-014-0824-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,5]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["824"],"URL":"https:\/\/doi.org\/10.1007\/s11276-014-0824-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2014,10,5]]}}}