{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:53:28Z","timestamp":1774454008585,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/iccchinaw.2015.7961570","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T17:35:54Z","timestamp":1499708154000},"page":"7-11","source":"Crossref","is-referenced-by-count":3,"title":["User privacy protection for cloud computing based smart grid"],"prefix":"10.1109","author":[{"family":"Yuanpeng Xie","sequence":"first","affiliation":[]},{"family":"Yixin Jiang","sequence":"additional","affiliation":[]},{"family":"Runfa Liao","sequence":"additional","affiliation":[]},{"family":"Hong Wen","sequence":"additional","affiliation":[]},{"family":"Jiaxiao Meng","sequence":"additional","affiliation":[]},{"family":"Xiaobin Guo","sequence":"additional","affiliation":[]},{"family":"Aidong Xu","sequence":"additional","affiliation":[]},{"family":"Zewu Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2010.19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.107"},{"key":"ref3","first-page":"674","article-title":"Smart grid cloud","volume":"2","author":"singh","year":"2012","journal-title":"SENSORS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/UPEC.2014.6934607"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497831"},{"key":"ref8","first-page":"548","article-title":"Hierarchical ID-based cryptography","author":"craig","year":"2002","journal-title":"Advances in Cryptology- ASIACRYPT 2002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref2","first-page":"398","article-title":"Cloud-based demand response for smart grid: Architecture and distributed algorithms","author":"kim","year":"2011","journal-title":"2011 IEEE International Conference on Smart Grid Communications (SmartGridComm)"},{"key":"ref1","year":"2009","journal-title":"Report to NIST on the Smart Grid Interoperability Standards Roadmap (Contract No SB1341-09-CN-0031)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"}],"event":{"name":"2015 IEEE\/CIC International Conference on Communications in China - Workshops (CIC\/ICCC)","location":"Shenzhen, China","start":{"date-parts":[[2015,11,2]]},"end":{"date-parts":[[2015,11,4]]}},"container-title":["2015 IEEE\/CIC International Conference on Communications in China - Workshops (CIC\/ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7954561\/7961565\/07961570.pdf?arnumber=7961570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:24:20Z","timestamp":1499819060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7961570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iccchinaw.2015.7961570","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}