{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:05:41Z","timestamp":1771668341690,"version":"3.50.1"},"reference-count":33,"publisher":"Informa UK Limited","issue":"2","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61171075"],"award-info":[{"award-number":["No. 61171075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61472294"],"award-info":[{"award-number":["No. 61472294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Visiting Scholarship of State Key Laboratory of Power Transmission Equipment & System Security and New Technology (Chongqing University, China)","award":["No. 2007DA10512710407"],"award-info":[{"award-number":["No. 2007DA10512710407"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2017,2,7]]},"DOI":"10.1080\/17517575.2015.1033767","type":"journal-article","created":{"date-parts":[[2015,4,23]],"date-time":"2015-04-23T16:25:49Z","timestamp":1429806349000},"page":"223-249","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":19,"title":["Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks"],"prefix":"10.1080","volume":"11","author":[{"given":"Xin","family":"Yan","sequence":"first","affiliation":[]},{"given":"Ling","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Youlong","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Xiaoxing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,4,23]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892879"},{"key":"CIT0002","volume-title":"Digital Watermarking and Steganography","author":"Cox I. J.","year":"2007"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2114678"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.122010.100087"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00021"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160661"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2006.09.006"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.01.005"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2039455"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2010.939468"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2008.016088"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.120610.101018"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6724101"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6549287"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1080\/17517570802521163"},{"issue":"4","key":"CIT0019","first-page":"1679","volume":"2","author":"Khurana S.","year":"2011","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621968"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/17517570902749144"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2011.654266"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.13"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2225851"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1002\/9781118562260"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.02.023"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.684802"},{"issue":"1","key":"CIT0031","first-page":"96","volume":"9","author":"Rehman S. U.","year":"2012","journal-title":"International Journal of Computer Science Issues"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2013.39"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2010.036025"},{"key":"CIT0035","volume-title":"Frontiers in Enterprise Integration","author":"Xu L. D.","year":"2007"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2167156"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.05.005"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2015.1033767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T04:18:58Z","timestamp":1481602738000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2015.1033767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,23]]},"references-count":33,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2013,5,14]]},"published-print":{"date-parts":[[2017,2,7]]}},"alternative-id":["10.1080\/17517575.2015.1033767"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2015.1033767","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,23]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}