{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:17:07Z","timestamp":1770916627479,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/tsg.2015.2424160","type":"journal-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T18:27:32Z","timestamp":1431368852000},"page":"2484-2492","source":"Crossref","is-referenced-by-count":59,"title":["A Secure Communication Architecture for Distributed Microgrid Control"],"prefix":"10.1109","volume":"6","author":[{"given":"Velin","family":"Kounev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9429-6425","authenticated-orcid":false,"given":"David","family":"Tipper","sequence":"additional","affiliation":[]},{"given":"Attila Altay","family":"Yavuz","sequence":"additional","affiliation":[]},{"given":"Brandon M.","family":"Grainger","sequence":"additional","affiliation":[]},{"given":"Gregory F.","family":"Reed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","author":"nutaro","year":"2011","journal-title":"Building Software for Simulation Theory and Algorithms With Applications in C++"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2012.6389034"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2008.2009274"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref12","year":"2010"},{"key":"ref13","year":"2003"},{"key":"ref14","first-page":"1","article-title":"The protection of substation communications","author":"fuloria","year":"2012","journal-title":"Proc SCADA Security Sci Symp"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848446"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45450-0_11","article-title":"Better than BiBa: Short one-time signatures with fast signing and verifying","author":"reyzin","year":"2002","journal-title":"Information Security and Privacy"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2013.6688006"},{"key":"ref18","first-page":"1","article-title":"A flexible approach to embedded network multicast authentication","author":"szilagy","year":"2008","journal-title":"Proc 2nd Workshop Embedded Syst Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062037"},{"key":"ref28","year":"2014","journal-title":"The OpenWrt Developer Team"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PESC.2004.1354758"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/175262"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2012.2215055"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2197425"},{"key":"ref29","year":"2014","journal-title":"The AES-CMAC-96 Algorithm and its Use With IPSEC"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2007.386042"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2014.6863405"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2066534"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.882019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDC.2014.6863567"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2006.1708993"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.2172\/1090210","article-title":"Microgrid cyber security reference architecture","author":"veitch","year":"2013"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2005.862146"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-38b-2005","article-title":"Recommendation for block cipher modes of operation: The CMAC mode for authentication","author":"dworkin","year":"2005"},{"key":"ref23","article-title":"ECRYPT II yearly report on algorithms and keysizes","author":"smart","year":"2010"},{"key":"ref26","first-page":"287","article-title":"Comparative study of multicast authentication schemes with application to wide-area measurement system","author":"law","year":"2013","journal-title":"Proc 8th ACM SIGSAC Symp Inf Comput Commun Security"},{"key":"ref25","year":"2013","journal-title":"Algorithms Key Sizes and Parameters Report"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/7210244\/07105416.pdf?arnumber=7105416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:47Z","timestamp":1642003427000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7105416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":31,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2015.2424160","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9]]}}}