{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:45:52Z","timestamp":1725803152356},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/smartgridcomm.2013.6688008","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T18:37:57Z","timestamp":1388774277000},"page":"504-509","source":"Crossref","is-referenced-by-count":16,"title":["An advanced key management scheme for secure smart grid communications"],"prefix":"10.1109","author":[{"given":"Xuelian","family":"Long","sequence":"first","affiliation":[]},{"given":"David","family":"Tipper","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2013.6497906"},{"key":"17","first-page":"640","article-title":"Distributed multicast group security architecture for mobile ad hoc networks","author":"kong","year":"2006","journal-title":"Proc of IEEE Wireless Communications and Networking Conference (WCNC) '06"},{"journal-title":"Ultra Large Scale Power System Control Architecture","year":"0","author":"taft","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2001.953418"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.833129"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.397"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.060255"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.819978"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00034"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2011.943133"},{"key":"7","article-title":"Semantic constraints for trust transitivity","author":"j\ufffdang","year":"2005","journal-title":"Proc of 2nd Asia-Pacific Conf Conceptual Model (APCCM) '05"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214081"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2036181"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1145\/263105.263179","article-title":"Iolus: A framework for scalable secure multicasting","author":"mittra","year":"1997","journal-title":"Proc of ACM SIGCOMM '97"},{"key":"9","article-title":"The index poisoning attackin p2p file sharing systems","author":"liang","year":"2006","journal-title":"Proc of IEEE IEEEINFOCOM '06)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"}],"event":{"name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2013,10,21]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6678912\/6687920\/06688008.pdf?arnumber=6688008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:14:12Z","timestamp":1498108452000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6688008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2013.6688008","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}