{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T18:29:20Z","timestamp":1778437760205,"version":"3.51.4"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"23","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303237"],"award-info":[{"award-number":["61303237"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972366"],"award-info":[{"award-number":["61972366"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Project of the Hubei Key Laboratory of Intelligent Geo-Information Processing","award":["KLIGIP-2019B09"],"award-info":[{"award-number":["KLIGIP-2019B09"]}]},{"DOI":"10.13039\/501100002367","name":"Foundation of Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["KFKT2019-003"],"award-info":[{"award-number":["KFKT2019-003"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foundation of Henan Key Laboratory of Network Cryptography Technology","award":["LNCT2020-A01"],"award-info":[{"award-number":["LNCT2020-A01"]}]},{"name":"Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2018BDKFJJ009"],"award-info":[{"award-number":["2018BDKFJJ009"]}]},{"name":"Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2019BDKFJJ003"],"award-info":[{"award-number":["2019BDKFJJ003"]}]},{"name":"Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2019BDKFJJ011"],"award-info":[{"award-number":["2019BDKFJJ011"]}]},{"name":"Cloud Technology Endowed Professorship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,12,1]]},"DOI":"10.1109\/jiot.2021.3078175","type":"journal-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T04:07:46Z","timestamp":1620446866000},"page":"17120-17130","source":"Crossref","is-referenced-by-count":44,"title":["An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3558-917X","authenticated-orcid":false,"given":"Liping","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9324-9283","authenticated-orcid":false,"given":"Yue","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8590-1737","authenticated-orcid":false,"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0071-4412","authenticated-orcid":false,"given":"Yinghan","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"bruno blanchet","year":"2021","journal-title":"ProVerif Cryptographic protocol verifier in the formal model"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1584-x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/7384.963463"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2003.1204947"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1099-y"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2806974"},{"key":"ref37","first-page":"326","article-title":"Password-authenticated key exchange scheme using chaotic maps towards a new architecture in standard model","volume":"18","author":"zhu","year":"2016","journal-title":"Int J Netw Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.09.047"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2471095"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1304-6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2036481"},{"key":"ref40","year":"2018","journal-title":"OpenSSL"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900035"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159816"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2932127"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2005.851701"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-005-2403-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.07.026"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.02.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2732999"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2616876"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDC.2006.8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2807383"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1378-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2966160"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948851"},{"key":"ref5","article-title":"Two-pass privacy preserving authenticated key agreement scheme for smart grid","author":"qi","year":"2020","journal-title":"IEEE Syst J"},{"key":"ref8","first-page":"1","article-title":"Analyzing the impacts of plug-in electric vehicles on distribution networks in British Columbia","author":"kelly","year":"2010","journal-title":"Proc Electr Power Energy Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0783-x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2908698"},{"key":"ref9","article-title":"An efficient lightweight authentication scheme with adaptive resilience of asynchronization attacks for wireless sensor networks","author":"xiong","year":"2019","journal-title":"IEEE Trans Syst Man Cybern Syst early access"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2974258"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2602282"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2857558"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.002"},{"key":"ref42","year":"2019","journal-title":"PBC Library"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2199141"},{"key":"ref41","year":"2016","journal-title":"GMP"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2120634"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0091"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440658"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9620058\/09425542.pdf?arnumber=9425542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:34Z","timestamp":1652194414000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9425542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,1]]},"references-count":42,"journal-issue":{"issue":"23"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3078175","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,1]]}}}