{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T10:20:10Z","timestamp":1694082010712},"reference-count":33,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2018,3,4]]},"DOI":"10.1080\/19393555.2018.1446231","type":"journal-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T15:35:36Z","timestamp":1521128136000},"page":"102-118","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["TPS3: A privacy preserving data collection protocol for smart grids"],"prefix":"10.1080","volume":"27","author":[{"given":"Mehmet Ulvi","family":"\u015eim\u015fek","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Gazi University, Ankara, Turkey"}]},{"given":"Feyza","family":"Y\u0131ld\u0131r\u0131m Okay","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gazi University, Ankara, Turkey"}]},{"given":"Dilan","family":"Mert","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gazi University, Ankara, Turkey"}]},{"given":"Suat","family":"\u00d6zdemir","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gazi University, Ankara, Turkey"}]}],"member":"301","published-online":{"date-parts":[[2018,3,15]]},"reference":[{"key":"CIT0002","unstructured":"Bogdanov, D. (2007). How to securely perform computations on secret-shared data. Master\u2019s Thesis. Estonia: University of Tartu."},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0046-y"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0255-5"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1002\/9781119968696"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00021"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/AICI.2009.130"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2009.934876"},{"key":"CIT0014","volume-title":"Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.)","author":"Garcia F. D."},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166794"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257527"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.61"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257525"},{"key":"CIT0025","author":"Li, X., Liang, X., Lu, R., Shen, X., Lin, X., &amp; Zhu, H.","year":"2012","journal-title":"IEEE Communications Magazine"},{"key":"CIT0026","author":"Lu, R., Liang, X., Li, X., Lin, X., &amp; Shen, X.","year":"2012","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161428"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046346"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.02.018"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130716"},{"key":"CIT0041","volume-title":"Networking Bible","author":"Sosinsky B.","year":"2009"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2616442"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382242"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.06.007"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.007"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2018.1446231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,30]],"date-time":"2018-03-30T14:45:45Z","timestamp":1522421145000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2018.1446231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,4]]},"references-count":33,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,3,30]]},"published-print":{"date-parts":[[2018,3,4]]}},"alternative-id":["10.1080\/19393555.2018.1446231"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2018.1446231","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}