{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T08:49:00Z","timestamp":1746521340263},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/eurocon.2013.6625161","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:48:16Z","timestamp":1382032096000},"page":"1401-1405","source":"Crossref","is-referenced-by-count":9,"title":["A security privacy protection scheme for data collection of smart meters based on homomorphic encryption"],"prefix":"10.1109","author":[{"given":"Niu","family":"Yukun","sequence":"first","affiliation":[]},{"given":"Tan","family":"Xiaobin","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Wang","family":"Haifeng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Kai","sequence":"additional","affiliation":[]},{"given":"Bu","family":"Zhiyong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Privacy concerns in upcoming residential and commercial demand-response systems","author":"lisovich","year":"2008","journal-title":"The TRUST 2008 Spring Conference"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5606359"},{"key":"10","first-page":"19","article-title":"How to break MD5 and other hash functions","author":"wang","year":"2005","journal-title":"EUROCRYPT'05 Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques"},{"key":"1","article-title":"Smart grid C the new and improved power grid: A survey","author":"xi","year":"2011","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"7","article-title":"Privacy-friendly energy-metering via ho-momorphic encryption","author":"garcia","year":"2010","journal-title":"6th Wksp Security and Trust Management"},{"journal-title":"NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1 0","year":"2010","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6194398"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"11","first-page":"17","article-title":"Finding collisions in the full SHA-1","author":"wang","year":"2005","journal-title":"Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology"}],"event":{"name":"IEEE EUROCON 2013","start":{"date-parts":[[2013,7,1]]},"location":"Zagreb, Croatia","end":{"date-parts":[[2013,7,4]]}},"container-title":["Eurocon 2013"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596534\/6624951\/06625161.pdf?arnumber=6625161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:14:52Z","timestamp":1490228092000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6625161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/eurocon.2013.6625161","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}