{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:38:19Z","timestamp":1729665499664,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/pccc.2014.7017076","type":"proceedings-article","created":{"date-parts":[[2015,1,23]],"date-time":"2015-01-23T21:24:09Z","timestamp":1422048249000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["An efficient certificate revocation scheme for large-scale AMI networks"],"prefix":"10.1109","author":[{"given":"Mohamed","family":"Mahmoud","sequence":"first","affiliation":[]},{"given":"Kemal","family":"Akkaya","sequence":"additional","affiliation":[]},{"given":"Khaled","family":"Rabieh","sequence":"additional","affiliation":[]},{"given":"Samet","family":"Tonyali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2009.0062"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354587"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/357744.357892"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ColComCon.2012.6233649"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622026"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317949"},{"key":"14","article-title":"Network simulations with the ns-3 simulator","author":"henderson","year":"2008","journal-title":"SIGCOMM'08 Demos"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110309"},{"key":"21","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/978-3-540-24676-3_32","article-title":"Merkle tree traversal in log space and time","volume":"3027","author":"szydlo","year":"2004","journal-title":"Proceedings of Advances in Cryptology Eurocrypt94 Lecture Notes in Computer Science"},{"journal-title":"Fed Information Processing Standards Publication 180-1","article-title":"Digital hash standard","year":"1995","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"journal-title":"Fips 186-3 Digital Signature Standard","year":"2009","key":"23"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"journal-title":"Crypto++ Library 5 6 0","year":"2014","author":"dai","key":"25"},{"journal-title":"Korean Electric Power Research Institute","year":"2013","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2120634"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"journal-title":"NISTIR 7628 the Smart Grid Interoperability Panel-Cyber Security Working Group","article-title":"Guidelines for smart grid cyber security: Vol. 3 supportive analyses and references","year":"2010","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"10","article-title":"Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile","author":"housley","year":"2002","journal-title":"RFC 3280 IETF"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2009.934876"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831167"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2062549"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.92"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2560"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.211"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007776"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849309"},{"key":"9","first-page":"3604","author":"wang","year":"2011","journal-title":"Survey Paper A Survey on the Communication Architectures in Smart Grid"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831168"}],"event":{"name":"2014 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2014,12,5]]},"location":"Austin, TX, USA","end":{"date-parts":[[2014,12,7]]}},"container-title":["2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7001444\/7017012\/07017076.pdf?arnumber=7017076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:16:21Z","timestamp":1498176981000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7017076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/pccc.2014.7017076","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}