{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:28:37Z","timestamp":1761676117852,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2512921.2512926","type":"proceedings-article","created":{"date-parts":[[2013,11,6]],"date-time":"2013-11-06T19:30:29Z","timestamp":1383766229000},"page":"45-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Security and privacy of electric vehicles in the smart grid context"],"prefix":"10.1145","author":[{"given":"Hasen","family":"Nicanfar","sequence":"first","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Peyman","family":"TalebiFard","sequence":"additional","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Seyedali","family":"Hosseininezhad","sequence":"additional","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Victor C.M.","family":"Leung","sequence":"additional","affiliation":[{"name":"The University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Mark","family":"Damm","sequence":"additional","affiliation":[{"name":"Fuseforward Solution Group Ltd., Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sep.","author":"Smart Grid NIST","year":"2010","unstructured":"NIST Smart Grid , Cyber Security Working Group, \"Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security,\" Guideline , Sep. 2010 . {Online}. Available: www.nist.gov\/smartgrid NIST Smart Grid, Cyber Security Working Group, \"Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security,\" Guideline, Sep. 2010. {Online}. Available: www.nist.gov\/smartgrid"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.49"},{"key":"e_1_3_2_1_3_1","volume-title":"Cyber Security Working Group, \"Guidelines for Smart Grid Cyber Security","author":"Smart Grid NIST","year":"2010","unstructured":"NIST Smart Grid , Cyber Security Working Group, \"Guidelines for Smart Grid Cyber Security : Vol. 1 , Smart Grid Cyber Security Strategy, Architecture , and High-Level Requirements,\" Guideline , Aug. 2010 . {Online}. Available: www.nist.gov\/smartgrid NIST Smart Grid, Cyber Security Working Group, \"Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements,\" Guideline, Aug. 2010. {Online}. Available: www.nist.gov\/smartgrid"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2172454"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2012.6175670"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160299"},{"key":"e_1_3_2_1_7_1","first-page":"273","volume-title":"IEEE","author":"Keiser J.","year":"2011","unstructured":"J. Keiser , J. Glass , N. Masuch , M. Lutzenberger , and S. Albayrak , \" A distributed multi-operator W2V2G management approach,\" in IEEE International Conference on Smart Grid Communications (SmartGridComm) . IEEE , 2011 , pp. 273 -- 278 . J. Keiser, J. Glass, N. Masuch, M. Lutzenberger, and S. Albayrak, \"A distributed multi-operator W2V2G management approach,\" in IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2011, pp. 273--278."},{"issue":"99","key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Efficient authentication and key management mechanisms for smart grid communications","author":"Nicanfar H.","year":"2013","unstructured":"H. Nicanfar , P. Jokar , K. Beznosov , and V. Leung , \" Efficient authentication and key management mechanisms for smart grid communications ,\" Systems Journal, IEEE , vol. PP, no. 99 , pp. 1 -- 12 , 2013 . H. Nicanfar, P. Jokar, K. Beznosov, and V. Leung, \"Efficient authentication and key management mechanisms for smart grid communications,\" Systems Journal, IEEE, vol. PP, no. 99, pp. 1--12, 2013.","journal-title":"Systems Journal, IEEE"},{"key":"e_1_3_2_1_9_1","first-page":"47","article-title":"Identity-based Cryptosystems and Signature Schemes","author":"Shamir A.","year":"1984","unstructured":"A. Shamir , \" Identity-based Cryptosystems and Signature Schemes ,\" in Advances in Cryptology-CRYPTO 1984. Springer, 1984 , pp. 47 -- 53 . A. Shamir, \"Identity-based Cryptosystems and Signature Schemes,\" in Advances in Cryptology-CRYPTO 1984. Springer, 1984, pp. 47--53.","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"e_1_3_2_1_10_1","first-page":"213","volume-title":"Identity-based encryption from the Weil pairing,\" in Advances in Cryptology-CRYPTO","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin , \" Identity-based encryption from the Weil pairing,\" in Advances in Cryptology-CRYPTO 2001 . Springer , 2001, pp. 213 -- 229 . D. Boneh and M. Franklin, \"Identity-based encryption from the Weil pairing,\" in Advances in Cryptology-CRYPTO 2001. Springer, 2001, pp. 213--229."},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE SysCon","author":"Nicanfar H.","year":"2012","unstructured":"H. Nicanfar and V. C. M. Leung , \"EIBC : Enhanced Identity-Based Cryptography, a Conceptual Design,\" in Proc . IEEE SysCon , Vancouver, BC , Mar. 2012 . H. Nicanfar and V. C. M. Leung, \"EIBC: Enhanced Identity-Based Cryptography, a Conceptual Design,\" in Proc. IEEE SysCon, Vancouver, BC, Mar. 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2386958.2386962"},{"key":"e_1_3_2_1_13_1","article-title":"Towards a Content-Centric Approach to Crowd-sensing in Vehicular Cloud","author":"TalebiFard P.","year":"2013","unstructured":"P. TalebiFard and V. C.M. Leung , \" Towards a Content-Centric Approach to Crowd-sensing in Vehicular Cloud ,\" Special Issue on Advanced Smart Vehicular Communication System and Applications, Journal of Systems Architecture , 2013 . P. TalebiFard and V. C.M.Leung, \"Towards a Content-Centric Approach to Crowd-sensing in Vehicular Cloud,\" Special Issue on Advanced Smart Vehicular Communication System and Applications, Journal of Systems Architecture ,2013.","journal-title":"Special Issue on Advanced Smart Vehicular Communication System and Applications, Journal of Systems Architecture"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2069000.2069015"},{"key":"e_1_3_2_1_15_1","first-page":"55","volume-title":"2013 IEEE Conference on. IEEE","author":"Nicanfar H.","year":"2013","unstructured":"H. Nicanfar , S. Hosseininezhad , P. TalebiFard , and V. Leung , \" Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations,\" in Computer Communications Workshops (INFOCOM WKSHPS) , 2013 IEEE Conference on. IEEE , 2013 , pp. 55 -- 60 . H. Nicanfar, S. Hosseininezhad, P. TalebiFard, and V. Leung, \"Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations,\" in Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on. IEEE, 2013, pp. 55--60."},{"key":"e_1_3_2_1_16_1","unstructured":"T. Wu phet al. \"SRP-6: Improvements and Refinements to the Secure Remote Password Protocol \" P1363.2 working group .  T. Wu phet al. \"SRP-6: Improvements and Refinements to the Secure Remote Password Protocol \" P1363.2 working group ."},{"key":"e_1_3_2_1_17_1","volume-title":"Cyber Security Working Group, \"Guidelines for Smart Grid Cyber Security","author":"Smart Grid NIST","year":"2010","unstructured":"NIST Smart Grid , Cyber Security Working Group, \"Guidelines for Smart Grid Cyber Security : Vol. 2 , Privacy and the Smart Grid,\" Guideline , Aug. 2010 . {Online}. Available: www.nist.gov\/smartgrid NIST Smart Grid, Cyber Security Working Group, \"Guidelines for Smart Grid Cyber Security: Vol. 2, Privacy and the Smart Grid,\" Guideline, Aug. 2010. {Online}. Available: www.nist.gov\/smartgrid"},{"key":"e_1_3_2_1_18_1","volume-title":"Aug.","author":"Pfitzmann A.","year":"2010","unstructured":"A. Pfitzmann and M. Hansen , \" A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management,\" http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf , Aug. 2010 , v0.34. {Online}. Available: http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf A. Pfitzmann and M. Hansen, \"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management,\" http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf, Aug. 2010, v0.34. {Online}. Available: http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2386958.2386979"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2386958.2386975"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2012.93"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2140343"},{"key":"e_1_3_2_1_23_1","first-page":"2706","volume-title":"IEEE","author":"Tseng H.","year":"2012","unstructured":"H. Tseng , \"A secure and privacy-preserving communication protocol for v2g networks,\" in IEEE Wireless Communications and Networking Conference (WCNC) . IEEE , 2012 , pp. 2706 -- 2711 . H. Tseng, \"A secure and privacy-preserving communication protocol for v2g networks,\" in IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2012, pp. 2706--2711."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"e_1_3_2_1_25_1","first-page":"794","volume-title":"IEEE","author":"Sun Z.","year":"2010","unstructured":"Z. Sun and J. Ma , \" Efficient key management for advanced distribution automation system,\" in 2nd IEEE International Conference on Network Infrastructure and Digital Content . IEEE , 2010 , pp. 794 -- 798 . Z. Sun and J. Ma, \"Efficient key management for advanced distribution automation system,\" in 2nd IEEE International Conference on Network Infrastructure and Digital Content. IEEE, 2010, pp. 794--798."},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"2010 IEEE 72nd. IEEE","author":"Martinez J.","year":"2010","unstructured":"J. Martinez , P. Ruiz , and R. Marin , \" Impact of the Pre-Authentication Performance in Vehicular Networks,\" in Vehicular Technology Conference Fall (VTC 2010-Fall) , 2010 IEEE 72nd. IEEE , 2010 , pp. 1 -- 5 . J. Martinez, P. Ruiz, and R. Marin, \"Impact of the Pre-Authentication Performance in Vehicular Networks,\" in Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd. IEEE, 2010, pp. 1--5."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2089544"},{"key":"e_1_3_2_1_28_1","first-page":"1","volume-title":"2010 IEEE. IEEE","author":"Paruchuri V.","year":"2010","unstructured":"V. Paruchuri and A. Durresi , \" PAAVE: Protocol for Anonymous Authentication in Vehicular Networks using Smart Cards,\" in Global Telecommunications Conference (GLOBECOM 2010) , 2010 IEEE. IEEE , 2010 , pp. 1 -- 5 . V. Paruchuri and A. Durresi, \"PAAVE: Protocol for Anonymous Authentication in Vehicular Networks using Smart Cards,\" in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. IEEE, 2010, pp. 1--5."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.263"},{"key":"e_1_3_2_1_30_1","unstructured":"\"AVISPA-Automated Validation of Internet Security Protocols.\" {Online}. Available: http:\/\/www.avispa-project.org  \"AVISPA-Automated Validation of Internet Security Protocols.\" {Online}. Available: http:\/\/www.avispa-project.org"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2168243"},{"key":"e_1_3_2_1_32_1","first-page":"5","volume-title":"GLOBECOM'05","volume":"3","author":"Boukerche A.","year":"2005","unstructured":"A. Boukerche and X. Li , \" An agent-based trust and reputation management scheme for wireless sensor networks,\" in Global Telecommunications Conference, 2005 . GLOBECOM'05 . IEEE, vol. 3 . IEEE, 2005 , pp. 5 --pp. A. Boukerche and X. Li, \"An agent-based trust and reputation management scheme for wireless sensor networks,\" in Global Telecommunications Conference, 2005. GLOBECOM'05. IEEE, vol. 3. IEEE, 2005, pp. 5--pp."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2167993"}],"event":{"name":"MSWiM '13: 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Barcelona Spain","acronym":"MSWiM '13"},"container-title":["Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2512921.2512926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2512921.2512926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:51Z","timestamp":1750231731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2512921.2512926"}},"subtitle":["problem and solution"],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":33,"alternative-id":["10.1145\/2512921.2512926","10.1145\/2512921"],"URL":"https:\/\/doi.org\/10.1145\/2512921.2512926","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}