{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T02:45:10Z","timestamp":1767494710274},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/wf-iot.2018.8355112","type":"proceedings-article","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T17:25:21Z","timestamp":1525800321000},"page":"225-230","source":"Crossref","is-referenced-by-count":7,"title":["Chameleon: A blind double trapdoor hash function for securing AMI data aggregation"],"prefix":"10.1109","author":[{"given":"Heng Chuan","family":"Tan","sequence":"first","affiliation":[]},{"given":"Kelvin","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Sye Loong","family":"Keoh","sequence":"additional","affiliation":[]},{"given":"Zhaohui","family":"Tang","sequence":"additional","affiliation":[]},{"given":"David","family":"Leong","sequence":"additional","affiliation":[]},{"given":"Chin Sean","family":"Sum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2449278"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0983-3"},{"key":"ref12","article-title":"Chameleon Signatures","author":"krawczyk","year":"2000","journal-title":"NDSS"},{"key":"ref13","article-title":"Securing Industrial Control System: An End-to-End Integrity Verification Approach","author":"keoh","year":"2015","journal-title":"Proc Industrial Control System Security Workshop"},{"key":"ref14","first-page":"165","article-title":"On the Key Exposure Problem in Chameleon Hashes","author":"ateniese","year":"2004","journal-title":"SCN"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1210938"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.06.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1576702.1576743"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2012.6215496"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6939562"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2014.7064626"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.02.008"},{"journal-title":"Introduction to Wi-SUN Alliance","year":"2017","author":"alliance","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.12.114"},{"journal-title":"Secure and Privacy-Preserving Concentration of Metering Data in AMI Networks","year":"2017","author":"saxena","key":"ref9"}],"event":{"name":"2018 IEEE 4th World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2018,2,5]]},"location":"Singapore","end":{"date-parts":[[2018,2,8]]}},"container-title":["2018 IEEE 4th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8353083\/8355082\/08355112.pdf?arnumber=8355112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T14:54:33Z","timestamp":1527864873000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8355112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2018.8355112","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}