{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:43:03Z","timestamp":1761561783265,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/infcomw.2013.6562908","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T19:34:09Z","timestamp":1374780849000},"page":"55-60","source":"Crossref","is-referenced-by-count":6,"title":["Robust privacy-preserving authentication scheme for communication between Electric Vehicle as Power Energy Storage and power stations"],"prefix":"10.1109","author":[{"given":"Hasen","family":"Nicanfar","sequence":"first","affiliation":[]},{"given":"Seyedali","family":"Hosseininezhad","sequence":"additional","affiliation":[]},{"given":"Peyman","family":"TalebiFard","sequence":"additional","affiliation":[]},{"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214259"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2168243"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2140343"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/POWERCON.2010.5666447"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2167993"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102332"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2012.93"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2012.6175670"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160299"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"3","article-title":"Guidelines for smart grid cyber security: Smart grid cyber security strategy, architecture, and high-level requirements","volume":"1","year":"2010","journal-title":"Guidelines"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962862"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"journal-title":"Guidelines","article-title":"Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security","year":"2010","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2172454"},{"key":"7","article-title":"What is privacy, realy?","volume":"23","author":"blakley","year":"2006","journal-title":"Digital ID World Presentation"},{"key":"6","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Advances in CryptologyCRYPTO 2001"},{"key":"5","first-page":"47","article-title":"Identity-based Cryptosystems and Signature Schemes","author":"shamir","year":"1984","journal-title":"Advances in CryptologyCRYPTO 1984"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260942"},{"journal-title":"A terminology for talking about privacy by data minimization Anonymity unlinkability undetectability unobservability pseudonymity and identity management","year":"0","author":"pfitzmann","key":"9"},{"key":"8","article-title":"Guidelines for smart grid cyber security:Privacy and the smart grid","volume":"2","year":"2010","journal-title":"Guidelines"}],"event":{"name":"2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2013,4,14]]},"location":"Turin","end":{"date-parts":[[2013,4,19]]}},"container-title":["2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6556114\/6562841\/06562908.pdf?arnumber=6562908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:50:45Z","timestamp":1498063845000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6562908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2013.6562908","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}