{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:45Z","timestamp":1750306965914,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:00:00Z","timestamp":1367971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,8]]},"DOI":"10.1145\/2484313.2484349","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T12:15:27Z","timestamp":1368533727000},"page":"287-298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Comparative study of multicast authentication schemes with application to wide-area measurement system"],"prefix":"10.1145","author":[{"given":"Yee Wei","family":"Law","sequence":"first","affiliation":[{"name":"The University of Melbourne, Parkville, Australia"}]},{"given":"Zheng","family":"Gong","sequence":"additional","affiliation":[{"name":"South China Normal University, Guangzhou, China"}]},{"given":"Tie","family":"Luo","sequence":"additional","affiliation":[{"name":"Agency for Science, Technology and Research, Singapore, Singapore"}]},{"given":"Slaven","family":"Marusic","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Parkville, Australia"}]},{"given":"Marimuthu","family":"Palaniswami","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Parkville, Australia"}]}],"member":"320","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"volume-title":"59th Annual Georgia Tech Protective Relaying","year":"2005","author":"Adamiak M.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533093"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-005-6184-6"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2006.010201"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/3-540-36504-4_8","volume-title":"Financial Cryptography","author":"Coppersmith D.","year":"2003"},{"volume-title":"NIST","year":"2009","author":"Dang Q.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2011.6038941"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"J. Katz. Digital Signatures. Springer 2010.  J. Katz. Digital Signatures. Springer 2010.","DOI":"10.1007\/978-0-387-27712-7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11814764_32"},{"journal-title":"IEEE Communications Magazine","year":"2013","author":"Law Y. W.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2012.07.007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2138172"},{"key":"e_1_3_2_1_16_1","unstructured":"C. Martinez M. Parashar J. Dyer and J. Coroas. Phasor Data Requirements for Real Time Wide-Area Monitoring Control and Protection Applications. White paper EIPP -- Real Time Task Team Jan. 2005.  C. Martinez M. Parashar J. Dyer and J. Coroas. Phasor Data Requirements for Real Time Wide-Area Monitoring Control and Protection Applications. White paper EIPP -- Real Time Task Team Jan. 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502016"},{"key":"e_1_3_2_1_18_1","unstructured":"NIST. Guidelines for smart grid cyber security. IR 7628 Aug. 2010.  NIST. Guidelines for smart grid cyber security. IR 7628 Aug. 2010."},{"issue":"3","key":"e_1_3_2_1_19_1","first-page":"611","article-title":"Efficient one-time signature schemes for stream authentication","volume":"22","author":"Park Y.","year":"2006","journal-title":"Journal of Information Science and Engineering"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.501988"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_3_2_1_22_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-540-24654-1_7","volume-title":"Selected Areas in Cryptography","author":"Pieprzyk J.","year":"2004"},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-45450-0_11","volume-title":"Information Security and Privacy","author":"Reyzin L.","year":"2002"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2005.1512820"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2008.05.004"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6344-y"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2161960"},{"key":"e_1_3_2_1_28_1","unstructured":"UCTE. Final Report of the Investigation Committee on the 28 September 2003 Blackout in Italy Apr. 2004.  UCTE. Final Report of the Investigation Committee on the 28 September 2003 Blackout in Italy Apr. 2004."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514279"},{"volume-title":"Final Report on the","year":"2003","author":"S.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062037"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.010"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.039632"}],"event":{"name":"ASIA CCS '13: 8th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hangzhou China","acronym":"ASIA CCS '13"},"container-title":["Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484313.2484349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:19Z","timestamp":1750235959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":32,"alternative-id":["10.1145\/2484313.2484349","10.1145\/2484313"],"URL":"https:\/\/doi.org\/10.1145\/2484313.2484349","relation":{},"subject":[],"published":{"date-parts":[[2013,5,8]]},"assertion":[{"value":"2013-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}