{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:20:54Z","timestamp":1772302854491,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Contr."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tac.2024.3518356","type":"journal-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:38:54Z","timestamp":1734377934000},"page":"3711-3726","source":"Crossref","is-referenced-by-count":4,"title":["A Secure Resilient Homomorphic Encryption Scheme for Control Systems"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8379-6873","authenticated-orcid":false,"given":"Moritz","family":"Fauser","sequence":"first","affiliation":[{"name":"Institute of Automatic Control, University of Kaiserslautern-Landau, Kaiserslautern, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9620-8193","authenticated-orcid":false,"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Automatic Control, University of Kaiserslautern-Landau, Kaiserslautern, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9683696"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2014.6837587"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2471260"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1515\/emj-2018-0002"},{"key":"ref5","article-title":"Mitigating cloud vulnerabilities","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403296"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2021.3062956"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7799042"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619855"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2890887"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.390"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2819189"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2017.2779473"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619835"},{"key":"ref17","article-title":"A fully homomorphic encryption scheme","author":"Gentry","year":"2009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.10.392"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref21","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00427-0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9304149"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/ACC50511.2021.9483184"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2022.3142124"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/ECC54610.2021.9655161"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2023.3280460"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2019.8814612"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/AIM43001.2020.9158986"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2022.11.247"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3155263"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/9781119113072"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"ref38","article-title":"Design and implementation of lattice-based cryptography","author":"Lepoint","year":"2014"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54388-7_10"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75245-3_13"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1384-0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511721656"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63287-8"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_30"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2307\/1971363"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0091537"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1112\/S1461157016000218"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57808-4_6"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2981239"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57pt1r5"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1991.261702"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.843854"},{"key":"ref56","first-page":"1000","article-title":"Support function of minimal disturbance invariant set and its derivative: Application in designing feedback gain","volume-title":"Proc. 8th Asian Control Conf.","author":"Wang","year":"2011"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2018.2851152"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/87.845876"}],"container-title":["IEEE Transactions on Automatic Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9\/11018158\/10803041.pdf?arnumber=10803041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T15:50:04Z","timestamp":1748879404000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10803041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":58,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tac.2024.3518356","relation":{},"ISSN":["0018-9286","1558-2523","2334-3303"],"issn-type":[{"value":"0018-9286","type":"print"},{"value":"1558-2523","type":"electronic"},{"value":"2334-3303","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}