{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:03:57Z","timestamp":1763017437698},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883442","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"951-956","source":"Crossref","is-referenced-by-count":9,"title":["Achieving ranked range query in smart grid auction market"],"prefix":"10.1109","author":[{"given":"Yi","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hongwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mi","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"11","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Crypto"},{"journal-title":"Multiprecision Integer and Rational Arithmetic C\/c++library","year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195538"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.699"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"journal-title":"The Exact Security of An Identity Based Signature and Its Applications","year":"2004","author":"libert","key":"10"},{"key":"7","article-title":"Parq: A privacy-preserving range query scheme over encrypted metering data for smart grid","author":"wen","year":"0","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2271537"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503232"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120705"},{"key":"9","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-45537-X_8","article-title":"A simple algebraic representation of rijndael","author":"ferguson","year":"2001","journal-title":"Selected Areas in Cryptography"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883442.pdf?arnumber=6883442","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T12:39:19Z","timestamp":1565786359000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883442\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883442","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}