{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:36:32Z","timestamp":1768296992934,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/padsw.2014.7097884","type":"proceedings-article","created":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T10:35:19Z","timestamp":1430476519000},"page":"793-798","source":"Crossref","is-referenced-by-count":6,"title":["Improving smart grid authentication using Merkle Trees"],"prefix":"10.1109","author":[{"given":"Melesio Calderon","family":"Munoz","sequence":"first","affiliation":[]},{"given":"Melody","family":"Moh","sequence":"additional","affiliation":[]},{"given":"Teng-Sheng","family":"Moh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"259","author":"stallings","year":"1999","journal-title":"Cryptography and Network Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664310"},{"key":"ref12","first-page":"6","article-title":"Building a Stronger and Smarter Electrical Energy Infrastructure","year":"2010","journal-title":"IEEE-USA Board of Directors"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.187"},{"key":"ref14","year":"2008","journal-title":"Zigbee Alliance Zigbee specification"},{"key":"ref15","article-title":"ZigBee Hacking and the Kinetic World","author":"wright","year":"2010"},{"key":"ref16","year":"2014","journal-title":"Certicom Device Certification Authority for ZigBee Smart Energy"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1126\/science.1231298","article-title":"Scaling the Ion Trap Quantum Processor","author":"monroe","year":"2013","journal-title":"Science"},{"key":"ref19","author":"rieffel","year":"2011","journal-title":"Quantum Computing A Gentle Introduction"},{"key":"ref28","year":"2014","journal-title":"NTRU Crypto System"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2277963"},{"key":"ref3","first-page":"3","article-title":"Guidelines for Smart Grid Cyber Security","year":"2010","journal-title":"NISTIR 7628"},{"key":"ref6","article-title":"Implementation and evaluation of the DFF protocol for Advanced Metering Infrastructure (AMI) networks","author":"kapoor","year":"2014","journal-title":"Technical Report (Master Writing Project) Dept of Computer Science San Jose State University"},{"key":"ref5","article-title":"Improving Smart Grid Security using Merkle Trees","author":"mu\u00f1oz","year":"2014","journal-title":"accepted to present at IEEE Conference on Communications and Network Security (CNS'14)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2011.6190298"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25959-3_40"},{"key":"ref2","first-page":"1","article-title":"Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations","year":"2004","journal-title":"U S -Canada Power System Outage Task Force"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref1","first-page":"5","article-title":"The Smart Grid: A Primer","author":"kowalenko","year":"2010","journal-title":"The Institute IEEE"},{"key":"ref20","first-page":"429","author":"schneier","year":"1996","journal-title":"Applied Cryptography"},{"key":"ref22","author":"cormen","year":"2009","journal-title":"Introduction to Algorithms"},{"key":"ref21","first-page":"40","article-title":"Secrecy Authentication and Public Key Systems","author":"merkle","year":"1979","journal-title":"Information Systems Laboratory Stanford Electronics Laboratories Chapter v"},{"key":"ref24","article-title":"Merkel-Damgard Construction","year":"2014","journal-title":"Wikipedia"},{"key":"ref23","article-title":"Murmur Hash","author":"appleby","year":"2014"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2167354"},{"key":"ref25","year":"2014","journal-title":"The RSA Project"}],"event":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","location":"Hsinchu, Taiwan","start":{"date-parts":[[2014,12,16]]},"end":{"date-parts":[[2014,12,19]]}},"container-title":["2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7092978\/7097773\/07097884.pdf?arnumber=7097884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T06:43:42Z","timestamp":1498200222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7097884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/padsw.2014.7097884","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}