{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:38:36Z","timestamp":1762004316075,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1109\/ntms.2011.5721043","type":"proceedings-article","created":{"date-parts":[[2011,3,2]],"date-time":"2011-03-02T13:37:35Z","timestamp":1299073055000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["A Batch Authentication Protocol for V2G Communications"],"prefix":"10.1109","author":[{"family":"Huaqun Guo","sequence":"first","affiliation":[]},{"family":"Yongdong Wu","sequence":"additional","affiliation":[]},{"family":"Hongmei Chen","sequence":"additional","affiliation":[]},{"family":"Maode Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Power to the People: Run Your House on a Prius","author":"motavalli","year":"2007","journal-title":"New York Times"},{"key":"ref11","article-title":"Power grid is found susceptible to cyberattack","author":"mcmillan","year":"2009","journal-title":"IDG News Service"},{"year":"2009","key":"ref12","article-title":"Digital Signature Standard (DSS)"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1049\/el:19980833","article-title":"Batch Verifying Multiple RSA Digital Signatures","volume":"34","author":"ham","year":"1998","journal-title":"IEE Electronic Letters"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/BFb0054130","article-title":"Fast Batch Verification for Modular Exponentiation and Digital Signatures","author":"bellare","year":"1998","journal-title":"Proc Advances in Cryptology (EUROCRYPT '98)"},{"key":"ref15","first-page":"514","article-title":"Short Signatures from the Weil Pairing","author":"boneh","year":"2001","journal-title":"Proc Seventh Int'l Conf Theory and Application of Cryptology and Information Security Advances in Cryptology (ASIACRYPT '01)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1146847.1146869"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4290317"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.37"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_5"},{"journal-title":"Science Daily","article-title":"Car Prototype Generates Electricity, And Cash","year":"2007","key":"ref4"},{"year":"0","key":"ref3","article-title":"What is V2G?"},{"key":"ref6","article-title":"Connected Cars: Battery Electrics & Plug in Hybrids","author":"cocconi","year":"2005","journal-title":"The Seattle Electric Vehicle to Grid Forum"},{"year":"0","key":"ref5"},{"key":"ref8","article-title":"Final Report Development and Evaluation of a Plug-in HEV with Vehicle-to-Grid Power Flow","author":"gage","year":"2003","journal-title":"Report AC Propulsion"},{"key":"ref7","article-title":"Final Report Vehicle-to-Grid Demonstration Project: Grid Regulation Ancillary Service with a Battery Electric Vehicle","author":"brooks","year":"2002","journal-title":"Report AC Propulsion"},{"year":"2007","key":"ref2","article-title":"Pacific Gas and Electric Company Energizes Silicon Valley with Vehicle-to-Grid Technology"},{"key":"ref1","first-page":"473","author":"cleveland","year":"2006","journal-title":"Dictionary of Energy"},{"key":"ref9","article-title":"Overview of Some EPRI Smart Charging Projects and Communications Infrastructure Related Efforts","author":"halliwell","year":"2010","journal-title":"IEEE1809 Webinar"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762764"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161076"},{"key":"ref21","article-title":"A Survey of Two Signature Aggregation Techniques","volume":"6","author":"boneh","year":"2003","journal-title":"CryptoBytes a technical newsletter of RSA Laboratories"},{"year":"0","key":"ref24"},{"first-page":"21","year":"0","author":"guo","key":"ref23"}],"event":{"name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011)","start":{"date-parts":[[2011,2,7]]},"location":"Paris","end":{"date-parts":[[2011,2,10]]}},"container-title":["2011 4th IFIP International Conference on New Technologies, Mobility and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5720565\/5720575\/05721043.pdf?arnumber=5721043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T20:25:13Z","timestamp":1497903913000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5721043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ntms.2011.5721043","relation":{},"subject":[],"published":{"date-parts":[[2011,2]]}}}