{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:18:30Z","timestamp":1729678710296,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417029","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T19:11:24Z","timestamp":1459192284000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications"],"prefix":"10.1109","author":[{"given":"Rongxing","family":"Lu","sequence":"first","affiliation":[]},{"given":"Khalid","family":"Alharbi","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","article-title":"EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications","volume":"23","author":"lu","year":"2012","journal-title":"IEEE Trans Parallel Distrib Syst"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1653662.1653666"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/168588.168596"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.ins.2007.07.025"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s12083-014-0255-5"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-642-31284-7_33"},{"key":"ref6","article-title":"Privacy-preserving aggregation of time-series data","author":"shi","year":"2011","journal-title":"Proceedings of the Network and Distributed System Security Symposium NDSS 2011 San Diego California USA 6th February - 9th February 2011"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/WCSP.2012.6542936"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s12083-014-0292-0"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/JIOT.2015.2412552"},{"key":"ref2","first-page":"226","article-title":"Privacy-friendly energy-metering via homomorphic encryption","author":"garcia","year":"2010","journal-title":"Security and Trust Management - 6th International Workshop STM 2010 Athens Greece September 23&#x2013;24 2010 Revised Selected Papers"},{"year":"0","article-title":"Consumer benefits","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1002\/sec.1191"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:40:42Z","timestamp":1602690042000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417029","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}