{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:34:46Z","timestamp":1729643686449,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/smartgridcomm.2012.6485999","type":"proceedings-article","created":{"date-parts":[[2013,4,3]],"date-time":"2013-04-03T23:21:58Z","timestamp":1365031318000},"page":"294-299","source":"Crossref","is-referenced-by-count":11,"title":["P3: Privacy preservation protocol for appliance control application"],"prefix":"10.1109","author":[{"given":"Depeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Zeyar","family":"Aung","sequence":"additional","affiliation":[]},{"given":"John","family":"Williams","sequence":"additional","affiliation":[]},{"given":"Abel","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622027"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6485999"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062037"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22263-4_10","article-title":"Privacy-friendly aggregation for the smart-grid","author":"kursawe","year":"2011","journal-title":"Privacy Enhancing Technologies"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622066"},{"key":"16","first-page":"270","article-title":"A hybrid group key management protocol for reliable and authenticated rekeying","volume":"6","author":"li","year":"2008","journal-title":"International Journal of Network Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160975"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"11","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","article-title":"Privacy-friendly energy-metering via homomorphic encryption","volume":"6710","author":"garcia","year":"2011","journal-title":"Security and Trust Management LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"21","first-page":"1","article-title":"Privacy concerns in upcoming residential and commercial demand-response systems","volume":"1","author":"lisovich","year":"2008","journal-title":"IEEE Proceedings on Power Systems"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2138172"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.40"},{"journal-title":"The Stanford Pairing Based Crypto Library","year":"0","author":"lynn","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046720"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"year":"0","key":"27"},{"year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1370731"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102315"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102322"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0311-z"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"4","first-page":"1","author":"albadi","year":"2007","journal-title":"Demand Response in Electricity Markets An Overview IEEE Power Engineering Society General Meeting"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5606359"},{"key":"8","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from Weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"CRYPTO 2001 LNCS"}],"event":{"name":"2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2012,11,5]]},"location":"Tainan, Taiwan","end":{"date-parts":[[2012,11,8]]}},"container-title":["2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6479749\/6485945\/06485999.pdf?arnumber=6485999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:41:01Z","timestamp":1498027261000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6485999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2012.6485999","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}