{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T20:46:52Z","timestamp":1778359612522,"version":"3.51.4"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Smart Grid"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/tsg.2016.2630803","type":"journal-article","created":{"date-parts":[[2016,11,18]],"date-time":"2016-11-18T19:25:55Z","timestamp":1479497155000},"page":"3351-3361","source":"Crossref","is-referenced-by-count":69,"title":["Error-Resilient Masking Approaches for Privacy Preserving Data Aggregation"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6346-5759","authenticated-orcid":false,"given":"Fabian","family":"Knirsch","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gunther","family":"Eibl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dominik","family":"Engel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref12","author":"danezis","year":"2011","journal-title":"Differentially Private Billing with Rebates"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_9"},{"key":"ref14","article-title":"Privacy-preserving aggregation of time-series data","author":"shi","year":"2011","journal-title":"Proc Symp NDSS"},{"key":"ref15","first-page":"200","author":"chan","year":"2012","journal-title":"Privacy-Preserving Stream Aggregation With Fault Tolerance"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2013.6695231"},{"key":"ref18","first-page":"175","article-title":"Privacy-friendly aggregation for the smart-grid","author":"kursawe","year":"2011","journal-title":"Proc Symp Privacy EnhancedTechnol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0181-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.586"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847974"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/5.192069"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.052914.00090"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2343611"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382242"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2402224"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2376613"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/978-3-642-31284-7_33","article-title":"Private computation of spatial and temporal power consumption with smart meters","author":"erkin","year":"2012","journal-title":"Proc 10th Int'l Conf Applied Cryptography and Network Security (ACNS)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600920"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2516930.2516944"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2011.11.049"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-642-22263-4_11","article-title":"Plug-in privacy for smart metering billing","author":"jawurek","year":"2011","journal-title":"Proc Privacy Enhancing Technol (PET'09)"},{"key":"ref24","volume":"1","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301326"},{"key":"ref26","year":"2012","journal-title":"Recommendation ITU-T X 509&#x2014;Information technology&#x2014;Open systems interconnection&#x2014;The directory Public-key and attribute certificate frameworks"},{"key":"ref25","year":"2001","journal-title":"Specification for the Advanced Encryption Standard (AES)"}],"container-title":["IEEE Transactions on Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165411\/8388565\/07748572.pdf?arnumber=7748572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T04:20:36Z","timestamp":1643170836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7748572\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":28,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tsg.2016.2630803","relation":{},"ISSN":["1949-3053","1949-3061"],"issn-type":[{"value":"1949-3053","type":"print"},{"value":"1949-3061","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7]]}}}