{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:41:49Z","timestamp":1773927709790,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370027"],"award-info":[{"award-number":["61370027"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61003223"],"award-info":[{"award-number":["61003223"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tsinghua National Laboratory for Information Science and Technology (TNList) Cross-discipline Foundation and State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Electron."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/tie.2014.2331014","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T14:51:25Z","timestamp":1403189485000},"page":"7055-7066","source":"Crossref","is-referenced-by-count":101,"title":["SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids"],"prefix":"10.1109","volume":"61","author":[{"given":"Zhiguo","family":"Wan","sequence":"first","affiliation":[]},{"given":"Guilin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanjiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shenxing","family":"Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2199141"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2120634"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2036181"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160661"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2138172"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2008.2005683"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2070771"},{"key":"ref18","year":"2008","journal-title":"Advanced Metering Infrastructure"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.53"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218253"},{"key":"ref5","year":"2010","journal-title":"Smart Grid Cyber Security Strategy Architecture and High-Level Requirements"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2216237"},{"key":"ref7","year":"2010","journal-title":"Security Profile for Advanced Metering Infrastructure"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2125930"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486004"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2039455"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2003.1212715"},{"key":"ref22","author":"scott","year":"2007"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","article-title":"Key establishment in large dynamic groups: Using one-way function trees","volume":"29","author":"mcgrew","year":"2003","journal-title":"IEEE Trans Softw Eng"},{"key":"ref24","first-page":"239","article-title":"Designing privacy-preserving smart meters with low-cost microcontrollers","author":"molina-markham","year":"0","journal-title":"Proc FC"},{"key":"ref23","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","author":"boneh","year":"0","journal-title":"Proc EUROCRYPT"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.011"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506580"}],"container-title":["IEEE Transactions on Industrial Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/41\/6898054\/06834788.pdf?arnumber=6834788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:51:45Z","timestamp":1641988305000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6834788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":26,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tie.2014.2331014","relation":{},"ISSN":["0278-0046","1557-9948"],"issn-type":[{"value":"0278-0046","type":"print"},{"value":"1557-9948","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12]]}}}