{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:35:59Z","timestamp":1775540159465,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/smartgridcomm.2019.8909712","type":"proceedings-article","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T01:39:16Z","timestamp":1574732356000},"page":"1-7","source":"Crossref","is-referenced-by-count":27,"title":["F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid"],"prefix":"10.1109","author":[{"given":"Ertem","family":"Esiner","sequence":"first","affiliation":[]},{"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[]},{"given":"Binbin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[]},{"given":"David","family":"Nicol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"IEC 61850-90-2 TR: Communication networks and systems for power utility automation part 90-2: Using iec 61850 for the communication between substations and control centres","year":"2015","journal-title":"International Electrotechnical Commission Std"},{"key":"ref11","year":"2018","journal-title":"Communications Requirements of Smart Grid Technologies"},{"key":"ref12","first-page":"445","author":"tsang","year":"2008","journal-title":"IFIP International Information Security Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_19"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_33"},{"key":"ref15","author":"esiner","year":"2019","journal-title":"F-Pro a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid Technical report"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2744802"},{"key":"ref17","author":"viega","year":"2002","journal-title":"Network Security with OpenSSL Cryptography for Secure Communications"},{"key":"ref18","year":"2018","journal-title":"Electric power and intelligent control (epic) testbed"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198461"},{"key":"ref4","author":"zetter","year":"2016","journal-title":"Inside the cunning unprecedented hack of ukraines power grid"},{"key":"ref3","year":"2016","journal-title":"Analysis of the Cyber Attack on the Ukrainian Power Grid"},{"key":"ref6","first-page":"1079","article-title":"Iec tc57 security standards for the power system&#x2019;s information infrastructure - beyond simple encryption","year":"2006","journal-title":"2005\/2006 IEEE\/PES Transmission and Distribution Conference and Exhibition"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330323"},{"key":"ref8","year":"2018","journal-title":"BeagleBoard-X15"},{"key":"ref7","article-title":"Cyber security practical considerations for implementing iec 62351","author":"hohlbaum","year":"2010","journal-title":"PAC World Conf"},{"key":"ref2","year":"2017","journal-title":"Crashoverride malware"},{"key":"ref9","article-title":"IEEE Power and Energy Society","year":"2004","journal-title":"IEEE Standard Communication Delivery Time Performance Requirements for Electric Power Substation Automation"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","article-title":"Aggregate and verifiably encrypted signatures from bilinear maps","author":"boneh","year":"2003","journal-title":"Advances in cryptology &#x2014; EUROCRYPT 2003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102139"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_28"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2014.6816403"},{"key":"ref23","first-page":"1","article-title":"A survey of two signature aggregation techniques","volume":"6","author":"boneh","year":"2003","journal-title":"RSA CryptoBytes"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23212"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_29"}],"event":{"name":"2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","location":"Beijing, China","start":{"date-parts":[[2019,10,21]]},"end":{"date-parts":[[2019,10,23]]}},"container-title":["2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8901543\/8909688\/08909712.pdf?arnumber=8909712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:50:22Z","timestamp":1658155822000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8909712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2019.8909712","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}