{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:45:25Z","timestamp":1761896725720,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T00:00:00Z","timestamp":1520812800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Institute for Information & communications Technology Promotio","award":["2017-0-00207"],"award-info":[{"award-number":["2017-0-00207"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2016R1D1A3A03918513"],"award-info":[{"award-number":["NRF-2016R1D1A3A03918513"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s12083-018-0637-1","type":"journal-article","created":{"date-parts":[[2018,3,11]],"date-time":"2018-03-11T20:26:12Z","timestamp":1520799972000},"page":"1299-1308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment"],"prefix":"10.1007","volume":"11","author":[{"given":"Donghyeok","family":"Lee","sequence":"first","affiliation":[]},{"given":"Namje","family":"Park","sequence":"additional","affiliation":[]},{"given":"Geonwoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seunghun","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,12]]},"reference":[{"issue":"1","key":"637_CR1","first-page":"1","volume":"1","author":"M Shargal","year":"2009","unstructured":"Shargal M, Houseman D (2009) The big picture of your coming smart grid. Smart Grid News 1(1):1\u20132","journal-title":"Smart Grid News"},{"issue":"3","key":"637_CR2","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s10586-014-0367-y","volume":"17","author":"N Park","year":"2014","unstructured":"Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653\u2013664","journal-title":"Clust Comput"},{"issue":"1","key":"637_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s16010020","volume":"16","author":"N Park","year":"2015","unstructured":"Park N, Kang N (2015) Mutual authentication scheme in secure internet of things Technology for Comfortable Lifestyle. Sensors 16(1):1\u201316","journal-title":"Sensors"},{"issue":"3","key":"637_CR4","first-page":"10","volume":"31","author":"DK Sung","year":"2013","unstructured":"Sung DK, Song N-O, Ko KS, Cha J, Bae KY, Jang H (2013) Convergence of power system technology and information communication Technology in Smart Grid. Commun Kor Inf Sci Soc 31(3):10\u201321","journal-title":"Commun Kor Inf Sci Soc"},{"issue":"10","key":"637_CR5","doi-asserted-by":"publisher","first-page":"841","DOI":"10.7840\/kics.2013.38C.10.841","volume":"38","author":"N Park","year":"2013","unstructured":"Park N (2013) UHF\/HF dual-band integrated mobile RFID\/NFC linkage method for mobile device-based business application. J KICS 38(10):841\u2013851","journal-title":"J KICS"},{"issue":"4","key":"637_CR6","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1504\/IJAHUC.2011.043583","volume":"8","author":"N Park","year":"2011","unstructured":"Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205\u2013219","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"issue":"1","key":"637_CR7","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/SMARTGRID.2010.5622089","volume":"1","author":"S Rusitschka","year":"2010","unstructured":"Rusitschka S, Eger K, Gerdes C (2010) Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm) 1(1):483\u2013488","journal-title":"2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm)"},{"key":"637_CR8","doi-asserted-by":"crossref","unstructured":"Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) Advanced web and network technologies, and applications, APWeb 2006 (Lecture notes in computer science), vol 3842. Springer, Heidelberg, pp 741\u2013748","DOI":"10.1007\/11610496_100"},{"issue":"1","key":"637_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2139\/ssrn.1370731","volume":"1","author":"EL Quinn","year":"2009","unstructured":"Quinn EL (2009) Privacy and the new energy infrastructure. Soc Sci Resear Netw (SSRN) 1(1):1\u201343. \n                    https:\/\/doi.org\/10.2139\/ssrn.1370731","journal-title":"Soc Sci Resear Netw (SSRN)"},{"key":"637_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/2965438","volume":"2016","author":"N Park","year":"2016","unstructured":"Namje Park, Hongxin Hu, Qun Jin (2016) Security and privacy mechanisms for sensor middleware and application in internet of things (IoT). Int J Distri Sens Netw 2016:1\u20133. \n                    https:\/\/doi.org\/10.1155\/2016\/2965438","journal-title":"Int J Distri Sens Netw"},{"key":"637_CR11","doi-asserted-by":"crossref","unstructured":"Agrawal R, et al (2004) Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM","DOI":"10.1145\/1007568.1007632"},{"issue":"3","key":"637_CR12","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1007\/s11227-016-1841-5","volume":"73","author":"D Lee","year":"2016","unstructured":"Lee D, Park N (2016) Geocasting-based synchronization of almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1103\u20131118","journal-title":"J Supercomput"},{"issue":"6","key":"637_CR13","doi-asserted-by":"publisher","first-page":"466","DOI":"10.7840\/kics.2014.39C.6.466","volume":"39C","author":"N Park","year":"2014","unstructured":"Park N (2014) Design and implementation of mobile VTS middleware for efficient IVEF service. J KICS 39C(6):466\u2013475","journal-title":"J KICS"},{"issue":"3","key":"637_CR14","first-page":"109","volume":"41","author":"D Choi","year":"2014","unstructured":"Choi D, Lee Y (2014) Privacy protection Technology for Public Information Open & sharing. J KIISE : Comput Syst Theory 41(3):109\u2013115","journal-title":"J KIISE : Comput Syst Theory"},{"issue":"3","key":"637_CR15","first-page":"621","volume":"22","author":"H-A Park","year":"2012","unstructured":"Park H-A (2012) Dong Hoon lee, Taik Yeong Chung,\"comprehensive study on security and privacy requirements for retrieval system over encrypted database\". J Kor Inst Inf Sec Cryptol 22(3):621\u2013635","journal-title":"J Kor Inst Inf Sec Cryptol"},{"issue":"5B","key":"637_CR16","first-page":"785","volume":"35","author":"N Park","year":"2010","unstructured":"Park N (2010) The implementation of open embedded S\/W platform for secure mobile RFID reader. J Kor Inst Commun Inf Sci 35(5B):785\u2013793","journal-title":"J Kor Inst Commun Inf Sci"},{"issue":"4","key":"637_CR17","first-page":"929","volume":"26","author":"D Lee","year":"2016","unstructured":"Lee D, Park N (2016) A proposal of SH-tree based data synchronization method for secure maritime cloud. J Kor Inst Inf Sec Cryptol 26(4):929\u2013940","journal-title":"J Kor Inst Inf Sec Cryptol"},{"issue":"6","key":"637_CR18","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1002\/sec.1108","volume":"9","author":"N Park","year":"2016","unstructured":"Park N, Bang H-C (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Sec Commun Netw 9(6):500\u2013512","journal-title":"Sec Commun Netw"},{"issue":"2","key":"637_CR19","first-page":"15","volume":"16","author":"D Kim","year":"2015","unstructured":"Kim D, Lee H (2015) Personal information de-Idenification trends based on big data. Rev Kor Soc Internet Inf 16(2):15\u201322","journal-title":"Rev Kor Soc Internet Inf"},{"key":"637_CR20","unstructured":"NIST (2014) Guidelines for smart grid cybersecurity, volume 2 - privacy and the smart grid. U.S. Department of Commerce, pp 291-473"},{"key":"637_CR21","doi-asserted-by":"publisher","unstructured":"Lee D, Park N, (2017) \u201cElectronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment\u201d, personal and ubiquitous computing, \n                    https:\/\/doi.org\/10.1007\/s00779-017-1017-1","DOI":"10.1007\/s00779-017-1017-1"},{"issue":"10A","key":"637_CR22","first-page":"4847","volume":"17","author":"N Park","year":"2014","unstructured":"Park N (2014) Implementation of inter-VTS data exchange format protocol based on mobile platform for next-generation vessel traffic service system. Inf Int Interdisciplinary J 17(10A):4847\u20134856","journal-title":"Inf Int Interdisciplinary J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-018-0637-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0637-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0637-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T21:20:44Z","timestamp":1552339244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-018-0637-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,12]]},"references-count":22,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["637"],"URL":"https:\/\/doi.org\/10.1007\/s12083-018-0637-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2018,3,12]]},"assertion":[{"value":"17 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}