{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:34Z","timestamp":1750220974406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T00:00:00Z","timestamp":1543449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"H2020","award":["787011"],"award-info":[{"award-number":["787011"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,29]]},"DOI":"10.1145\/3291533.3291559","type":"proceedings-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T18:39:17Z","timestamp":1546972757000},"page":"34-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards an anonymous incident communication channel for electric smart grids"],"prefix":"10.1145","author":[{"given":"Anna","family":"Triantafyllou","sequence":"first","affiliation":[{"name":"University of Western Macedonia, Kozani"}]},{"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"University of Western Macedonia, Kozani"}]},{"given":"Antonios","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"Sidroco Holdings Ltd, Limassol, Cyprus"}]},{"given":"Erkuden","family":"Rios","sequence":"additional","affiliation":[{"name":"Fundacion Tecnalia Research &amp; Innovation, Derio, Spain"}]},{"given":"Eider","family":"Iturbe","sequence":"additional","affiliation":[{"name":"Fundacion Tecnalia Research &amp; Innovation, Derio, Spain"}]}],"member":"320","published-online":{"date-parts":[[2018,11,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2015. Enhancing Resilience Through Cyber Incident Data Sharing And Analysis: Establishing Community-Relevant Data Categories in Support of a Cyber Incident Data Repository. (9 2015). https:\/\/www.hsdl.org\/?view&did=788825  2015. Enhancing Resilience Through Cyber Incident Data Sharing And Analysis: Establishing Community-Relevant Data Categories in Support of a Cyber Incident Data Repository. (9 2015). https:\/\/www.hsdl.org\/?view&did=788825"},{"key":"e_1_3_2_1_2_1","unstructured":"2015. Enhancing Resilience Through Cyber Incident Data Sharing And Analysis: Overcoming Perceived Obstacles to Sharing into a Cyber Incident Data Repository. (12 2015). https:\/\/www.hsdl.org\/?view&did=788824  2015. Enhancing Resilience Through Cyber Incident Data Sharing And Analysis: Overcoming Perceived Obstacles to Sharing into a Cyber Incident Data Repository. (12 2015). https:\/\/www.hsdl.org\/?view&did=788824"},{"key":"e_1_3_2_1_3_1","unstructured":"2015. Enhancing Resilience Through Cyber Incident Data Sharing And Analysis: Overcoming Perceived Obstacles to Sharing into a Cyber Incident Data Repository. (6 2015). https:\/\/www.hsdl.org\/?view&did=767778  2015. Enhancing Resilience Through Cyber Incident Data Sharing And Analysis: Overcoming Perceived Obstacles to Sharing into a Cyber Incident Data Repository. (6 2015). https:\/\/www.hsdl.org\/?view&did=767778"},{"volume-title":"International Journal of Engineering and Innovative Technology (IJEIT) 02 (04","year":"2013","author":"Agarwal Aayush","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Adnan Anwar and Abdun Naser Mahmood. 2014. Cyber Security of Smart Grid Infrastructure. CoRR abs\/1401.3936 (2014). arXiv:1401.3936 http:\/\/arxiv.org\/abs\/1401.3936  Adnan Anwar and Abdun Naser Mahmood. 2014. Cyber Security of Smart Grid Infrastructure. CoRR abs\/1401.3936 (2014). arXiv:1401.3936 http:\/\/arxiv.org\/abs\/1401.3936"},{"volume-title":"2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). 280--283","author":"Athiramol S.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.42"},{"key":"e_1_3_2_1_8_1","unstructured":"E. Byres D. Leversage and N. Kube. {n. d.}. Security Incidents and Trends in the SCADA and Process Industries - A statistical review of the Industrial Security Incident Database (ISID). https:\/\/www.controlglobal.com\/assets\/Media\/MediaManager\/wp_07_010_symantic_security.pdf Accessed: 2018-06-19.  E. Byres D. Leversage and N. Kube. {n. d.}. Security Incidents and Trends in the SCADA and Process Industries - A statistical review of the Industrial Security Incident Database (ISID). https:\/\/www.controlglobal.com\/assets\/Media\/MediaManager\/wp_07_010_symantic_security.pdf Accessed: 2018-06-19."},{"volume-title":"Advances in Cryptology --- EUROCRYPT '91, Donald W","author":"Chaum David","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","article-title":"Finding a needle in a haystack or identifying anonymous census records","volume":"2","author":"Dalenius Tore","year":"1986","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Hung Dao Tuan Hieu Minh Nguyen Cong Manh Tran Hai Nam Nguyen and N Moldovyan. 2017. Integrating Multisignature Scheme into the Group Signature Protocol. (11 2017) 294--301.  Hung Dao Tuan Hieu Minh Nguyen Cong Manh Tran Hai Nam Nguyen and N Moldovyan. 2017. Integrating Multisignature Scheme into the Group Signature Protocol. (11 2017) 294--301.","DOI":"10.1007\/978-3-319-49073-1_32"},{"key":"e_1_3_2_1_12_1","unstructured":"Department of Energy. {n. d.}. Energy Security. https:\/\/www.energy.gov\/ceser\/activities\/energy-security Accessed: 2018-06-19.  Department of Energy. {n. d.}. Energy Security. https:\/\/www.energy.gov\/ceser\/activities\/energy-security Accessed: 2018-06-19."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2017.08.002"},{"key":"e_1_3_2_1_14_1","unstructured":"EE-ISAC. {n. d.}. European Energy - Information Sharing and Analysis Centre Home Page. http:\/\/www.ee-isac.eu\/ Accessed: 2018-06-19.  EE-ISAC. {n. d.}. European Energy - Information Sharing and Analysis Centre Home Page. http:\/\/www.ee-isac.eu\/ Accessed: 2018-06-19."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Khaled El Emam and Fida Dankar. 2008. Protecting Privacy Using k-Anonymity. 15 (07 2008) 627--37.  Khaled El Emam and Fida Dankar. 2008. Protecting Privacy Using k-Anonymity. 15 (07 2008) 627--37.","DOI":"10.1197\/jamia.M2716"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0698-2"},{"key":"e_1_3_2_1_17_1","unstructured":"ESMIG. {n. d.}. ESMIG - Who We Are Page. http:\/\/esmig.eu\/ Accessed: 2018-06-19.  ESMIG. {n. d.}. ESMIG - Who We Are Page. http:\/\/esmig.eu\/ Accessed: 2018-06-19."},{"key":"e_1_3_2_1_18_1","first-page":"710","article-title":"Threshold Signature Scheme without Using Polynomial Interpolation","volume":"18","author":"Harn Lein","year":"2016","journal-title":"I. J. Network Security"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Dao Tuan Hung Nguyen Hieu Minh and Nguyen Nam Hai. 2018. A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority. In Information Systems Design and Intelligent Applications Vikrant Bhateja Bao Le Nguyen Nhu Gia Nguyen Suresh Chandra Satapathy and Dac-Nhuong Le (Eds.). Springer Singapore Singapore 64--72.  Dao Tuan Hung Nguyen Hieu Minh and Nguyen Nam Hai. 2018. A Hybrid Threshold Group Signature Scheme with Distinguished Signing Authority. In Information Systems Design and Intelligent Applications Vikrant Bhateja Bao Le Nguyen Nhu Gia Nguyen Suresh Chandra Satapathy and Dac-Nhuong Le (Eds.). Springer Singapore Singapore 64--72.","DOI":"10.1007\/978-981-10-7512-4_7"},{"key":"e_1_3_2_1_20_1","unstructured":"ICIC (Programa Nacional de Infraestructuras Criticas de Informacion y Ciberseguridad). {n. d.}. Qu\u00c3l' Hacemos. http:\/\/www.icic.gob.ar\/ Accessed: 2018-06-19.  ICIC (Programa Nacional de Infraestructuras Criticas de Informacion y Ciberseguridad). {n. d.}. Qu\u00c3l' Hacemos. http:\/\/www.icic.gob.ar\/ Accessed: 2018-06-19."},{"key":"e_1_3_2_1_21_1","unstructured":"Joshua J Tom Boniface Alese F Aderonke Thompson Promise Nlerum and Anebo D. 2018. Performance and Security of Group Signature in Wireless Networks. (05 2018).  Joshua J Tom Boniface Alese F Aderonke Thompson Promise Nlerum and Anebo D. 2018. Performance and Security of Group Signature in Wireless Networks. (05 2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Christopher S. Johnson Mark L. Badger David A. Waltermire Julie Snyder and Clem Skorupka. 2016. Guide to Cyber Threat Information Sharing. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-150.pdf  Christopher S. Johnson Mark L. Badger David A. Waltermire Julie Snyder and Clem Skorupka. 2016. Guide to Cyber Threat Information Sharing. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-150.pdf","DOI":"10.6028\/NIST.SP.800-150"},{"volume-title":"2016 International Conference on Cyber Conflict (CyCon U.S.). 1--6.","author":"Joyce A. L.","key":"e_1_3_2_1_23_1"},{"volume-title":"Book Chapter: Security in Distributed, Grid, and Pervasive Computing","year":"2007","author":"Kostopoulos G.","key":"e_1_3_2_1_24_1"},{"volume-title":"2007 IEEE 23rd International Conference on Data Engineering. 106--115","author":"Li N.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055591"},{"key":"e_1_3_2_1_28_1","first-page":"5","article-title":"Do not snoop my habits: preserving privacy in the smart grid","volume":"50","author":"M\u00c3 F. G.","year":"2012","journal-title":"IEEE Communications Magazine"},{"key":"e_1_3_2_1_29_1","unstructured":"National Information Security Center. 2015. National Center of Incident Readiness and Strategy for Cybersecurity Home Page. http:\/\/www.nisc.go.jp\/eng\/index.html Accessed: 2018-06-19.  National Information Security Center. 2015. National Center of Incident Readiness and Strategy for Cybersecurity Home Page. http:\/\/www.nisc.go.jp\/eng\/index.html Accessed: 2018-06-19."},{"key":"e_1_3_2_1_30_1","unstructured":"National Intelligence Service Korea. 2016. NIS Home Page. http:\/\/www.nis.go.kr\/AF\/1_7.do Accessed: 2018-06-19.  National Intelligence Service Korea. 2016. NIS Home Page. http:\/\/www.nis.go.kr\/AF\/1_7.do Accessed: 2018-06-19."},{"key":"e_1_3_2_1_31_1","unstructured":"L. Ponemon. {n. d.}. Cost of Data Breaches Rising Globally Says \u00e2\u0102&Yuml;2015 Cost of a Data Breach Study: Global Analysis. https:\/\/securityintelligence.com\/cost-of-a-data-breach-2015\/ Accessed: 2018-06-19.  L. Ponemon. {n. d.}. Cost of Data Breaches Rising Globally Says \u00e2\u0102&Yuml;2015 Cost of a Data Breach Study: Global Analysis. https:\/\/securityintelligence.com\/cost-of-a-data-breach-2015\/ Accessed: 2018-06-19."},{"key":"e_1_3_2_1_32_1","unstructured":"B. Prakash S. Kranthi Reddy Daljit Singh VBV Phani Sai Yeshwanth and Mutukulloju Sai Kumar. 2018. B-Anonymization: Privacy beyond k-Anonymization and l-Diversity. International Journal for Research in Applied Science and Engineering Technology (IJRASET) 06 (03 2018). Issue 03.  B. Prakash S. Kranthi Reddy Daljit Singh VBV Phani Sai Yeshwanth and Mutukulloju Sai Kumar. 2018. B-Anonymization: Privacy beyond k-Anonymization and l-Diversity. International Journal for Research in Applied Science and Engineering Technology (IJRASET) 06 (03 2018). Issue 03."},{"volume-title":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET). 1--7.","author":"Saeed R.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663876.2663882"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_37_1","unstructured":"U.S. Department of Homeland Security. {n. d.}. Homeland Security Information Network (HSIN). https:\/\/www.dhs.gov\/homeland-security-information-network-hsin Accessed: 2018-06-19.  U.S. Department of Homeland Security. {n. d.}. Homeland Security Information Network (HSIN). https:\/\/www.dhs.gov\/homeland-security-information-network-hsin Accessed: 2018-06-19."},{"key":"e_1_3_2_1_38_1","unstructured":"VERIS - Vocabulary for Event Recording and Incident Sharing. {n. d.}. VERIS Home Page. http:\/\/veriscommunity.net\/index.html Accessed: 2018-06-19\".  VERIS - Vocabulary for Event Recording and Incident Sharing. {n. d.}. VERIS Home Page. http:\/\/veriscommunity.net\/index.html Accessed: 2018-06-19\"."},{"volume-title":"Anatomy: Simple and Effective Privacy Preservation. In VLDB.","year":"2006","author":"Xiao Xiaokui","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.089"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"}],"event":{"name":"PCI '18: 22nd Pan-Hellenic Conference on Informatics","acronym":"PCI '18","location":"Athens Greece"},"container-title":["Proceedings of the 22nd Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3291533.3291559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3291533.3291559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:34Z","timestamp":1750204474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3291533.3291559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,29]]},"references-count":40,"alternative-id":["10.1145\/3291533.3291559","10.1145\/3291533"],"URL":"https:\/\/doi.org\/10.1145\/3291533.3291559","relation":{},"subject":[],"published":{"date-parts":[[2018,11,29]]},"assertion":[{"value":"2018-11-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}