{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:01:54Z","timestamp":1730232114684,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8423023","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Public-Key Revocation Management for Secure Smart Meter Communications Using One-Way Cryptographic Accumulators"],"prefix":"10.1109","author":[{"given":"Mumin","family":"Cebe","sequence":"first","affiliation":[]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"X 509 Internet public key infrastructure online certificate status protocol-OCSP","year":"2013","author":"galperin","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6961"},{"key":"ref12","first-page":"61","article-title":"Dynamic accumulators and application to efficient revocation of anonymous credentials","volume":"2442","author":"camenisch","year":"2002","journal-title":"Crypto"},{"key":"ref13","article-title":"Scalable certificate revocation schemes for smart grid ami networks using bloom filters","author":"rabieh","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007776"},{"key":"ref15","first-page":"274","article-title":"One-way accumulators: A decentralized alternative to digital signatures","author":"benaloh","year":"1993","journal-title":"Workshop on the Theory and Application of of Cryptographic Techniques"},{"key":"ref16","first-page":"480","article-title":"Collision-free accumulators and fail-stop signature schemes without trees","author":"bari?","year":"1997","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"ref17","first-page":"253","article-title":"Universal accumulators with efficient nonmembership proofs","volume":"7","author":"li","year":"2007","journal-title":"ACNS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44618-9_16"},{"key":"ref19","first-page":"43","article-title":"Accumulators with applications to anonymity-preserving revocation","volume":"2017","author":"baldimtsi","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.03.027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1016\/j.jnca.2005.07.008","article-title":"Secure and efficient key management in mobile ad hoc networks","volume":"30","author":"wu","year":"2007","journal-title":"Journal of Network and Computer Applications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2408597"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2009.934876"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133969"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120705"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831167"},{"journal-title":"ns-3 network simulator 3 &#x201D; Release 3 24 1 2016","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2017.58"},{"journal-title":"The Constrained Application Protocol (CoAP)","year":"2014","author":"shelby","key":"ref24"},{"journal-title":"Internet X 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","year":"2008","author":"cooper","key":"ref23"},{"key":"ref25","first-page":"684","article-title":"An improved construction for counting bloom filters","author":"bonomi","year":"2006","journal-title":"European Symposium on Algorithms"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","start":{"date-parts":[[2018,5,20]]},"location":"Kansas City, MO","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08423023.pdf?arnumber=8423023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:12:28Z","timestamp":1598235148000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8423023\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8423023","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}