{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:58:30Z","timestamp":1730267910176,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/indin.2018.8471959","type":"proceedings-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:00:15Z","timestamp":1539050415000},"page":"459-465","source":"Crossref","is-referenced-by-count":0,"title":["An Algorithmic Method for Tampering-Proof and Privacy-Preserving Smart Metering"],"prefix":"10.1109","author":[{"given":"Dongsheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Yingying","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yawen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Li","family":"Shang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066163"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2277938"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.039631"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2012.6336415"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503916"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2192487"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.586"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"ref19","first-page":"1b","article-title":"A privacy-preserving concept for smart grids","volume":"18","author":"petrlic","year":"2010","journal-title":"Sicherheit in Vernetzten Systemen"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"journal-title":"&#x201C; Assessment of demand response & advanced metering &#x201D;","year":"2012","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0116-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0046-y"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/44.31557"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620553"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2720195"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.931384"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2720159"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"journal-title":"Telegraphic Code to Insure Privacy and Secrecy in the Transmission of Telegrams","year":"1882","author":"miller","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.136"},{"journal-title":"&#x201C; Cryptographic communications system and method &#x201D;","year":"1983","author":"rivest","key":"ref23"},{"journal-title":"Introduction to Modern Cryptography","year":"2008","author":"katz","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"}],"event":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2018,7,18]]},"location":"Porto","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE 16th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8453042\/8471919\/08471959.pdf?arnumber=8471959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T04:44:11Z","timestamp":1640234651000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8471959\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/indin.2018.8471959","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}