{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T14:21:35Z","timestamp":1773238895021,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/smartgridcomm.2014.7007757","type":"proceedings-article","created":{"date-parts":[[2015,1,20]],"date-time":"2015-01-20T02:42:49Z","timestamp":1421721769000},"page":"866-871","source":"Crossref","is-referenced-by-count":16,"title":["Privacy preserving disclosure of authenticated energy usage data"],"prefix":"10.1109","author":[{"given":"Daisuke","family":"Mashima","sequence":"first","affiliation":[]},{"given":"Arnab","family":"Roy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-642-32946-3_18","article-title":"Designing privacy-preserving smart meters with low-cost microcontrollers","author":"molina-markham","year":"2012","journal-title":"Financial Cryptography"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554982"},{"key":"18","first-page":"192","article-title":"Plug-in privacy for smart metering billing","author":"jawurek","year":"2011","journal-title":"PETS"},{"key":"33","article-title":"Evaluating electricity theft detectors in AMI systems","author":"mashima","year":"2012","journal-title":"Proceedings of RAID"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"16","first-page":"4","article-title":"Privacypreserving aggregation of time-series data","volume":"2","author":"shi","year":"2011","journal-title":"NDSS"},{"key":"13","first-page":"244","article-title":"Homomorphic signature schemes","author":"johnson","year":"2002","journal-title":"CT-RSA"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"11","year":"0","journal-title":"Pg&e Privacy Policy"},{"key":"12","year":"0","journal-title":"Report on the Local and Regional Consequences of the Development of Smart Grids"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516944"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.26"},{"key":"22","author":"fan","year":"2012","journal-title":"Adaptively Sharing Time-series with Differential Privacy"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2602044.2602051"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517844"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/230514.571645"},{"key":"27","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/11761679_21","article-title":"Perfect non-interactive zero knowledge for np","author":"groth","year":"2006","journal-title":"Advances in Cryptology-EUROCRYPT 2006"},{"key":"28","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/978-3-642-17373-8_19","article-title":"Short pairing-based non-interactive zero-knowledge arguments","author":"groth","year":"2010","journal-title":"Advances in Cryptology-ASIACRYPT 2010"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"3","year":"0","journal-title":"Green Button"},{"key":"2","year":"2013","journal-title":"Data Access Use and Privacy"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"1","year":"0","journal-title":"Openadr 2 0 Specifications"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42033-7_1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.5735484"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/5.192069"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.71"},{"key":"31","author":"lynn","year":"2006","journal-title":"The pairing-based cryptography library"},{"key":"4","volume":"2","year":"0","journal-title":"Guidelines for Smart Grid Cybersecurity"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516935"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2012.08.062"}],"event":{"name":"2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)","location":"Venice, Italy","start":{"date-parts":[[2014,11,3]]},"end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6995184\/7007609\/07007757.pdf?arnumber=7007757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T21:40:52Z","timestamp":1566250852000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7007757\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2014.7007757","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}