{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:13:43Z","timestamp":1747808023548,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393395","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T22:38:33Z","timestamp":1531780713000},"page":"895-899","source":"Crossref","is-referenced-by-count":3,"title":["A light-weight secret key-based privacy preserving technique for home area networks in smart grid"],"prefix":"10.1109","author":[{"given":"Shams","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Eraj","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sultan","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Wajahat","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1003","article-title":"Multi receiver proxy signcrypion based on hyper elliptic curve cryptography","volume":"14","author":"ullah","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.and.EUC.2013.228"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2014.6866615"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849308"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2014.6992067"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2016.7603481"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228343"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.1108r3"},{"key":"ref7","first-page":"257","article-title":"Proxy blind signcrypion based on elliptic curve","volume":"14","author":"sadat","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"key":"ref2","article-title":"Challenges of smart grid","volume":"2","author":"joy","year":"2013","journal-title":"International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2011.6133655"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2009.934876"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2017,7,29]]},"location":"Guilin","end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393395.pdf?arnumber=8393395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:56:09Z","timestamp":1598248569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393395\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393395","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}