{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:18:01Z","timestamp":1771705081512,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1109\/isncc49221.2020.9297246","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:06:21Z","timestamp":1608933981000},"page":"1-7","source":"Crossref","is-referenced-by-count":52,"title":["PMBFE: Efficient and Privacy-Preserving Monitoring and Billing Using Functional Encryption for AMI Networks"],"prefix":"10.1109","author":[{"given":"Mohamed I.","family":"Ibrahem","sequence":"first","affiliation":[]},{"given":"Mahmoud M.","family":"Badr","sequence":"additional","affiliation":[]},{"given":"Mostafa M.","family":"Fouda","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Mahmoud","sequence":"additional","affiliation":[]},{"given":"Waleed","family":"Alasmary","sequence":"additional","affiliation":[]},{"given":"Zubair Md.","family":"Fadlullah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2019.8786482"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04904-0_28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741147"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848230"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2277938"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPACE.2015.7274926"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2895769"},{"key":"ref2","article-title":"Analysis of the cyber attack on the ukrainian power grid","volume":"388","author":"lee","year":"2016","journal-title":"Electricity Information Sharing and Analysis Center (E-ISAC)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2720159"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.3390\/en11082085","article-title":"Efficient and privacy-preserving data aggregation and dynamic billing in smart grid metering networks","volume":"11","author":"braeken","year":"2018","journal-title":"Energies"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref22","article-title":"Faster cryptonets: Leveraging sparsity for real-world encrypted inference","author":"chou","year":"2018"},{"key":"ref21","first-page":"113124","article-title":"Can homomorphic encryption be practical?","author":"naehrig","year":"0"},{"key":"ref24","article-title":"Irish social science data archive","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_18"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"}],"event":{"name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","location":"Montreal, QC, Canada","start":{"date-parts":[[2020,10,20]]},"end":{"date-parts":[[2020,10,22]]}},"container-title":["2020 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9297148\/9297168\/09297246.pdf?arnumber=9297246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:17Z","timestamp":1656453077000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9297246\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isncc49221.2020.9297246","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]}}}