{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:21Z","timestamp":1750220901114,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T00:00:00Z","timestamp":1575590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,6]]},"DOI":"10.1145\/3374587.3374631","type":"proceedings-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T18:16:31Z","timestamp":1583345791000},"page":"252-257","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Transmission Scheme of Sensitive Power Information in Ubiquitous Power IoT"],"prefix":"10.1145","author":[{"given":"Jingtang","family":"Luo","sequence":"first","affiliation":[{"name":"State Grid Sichuan Economic Research Institute Chengdu"}]},{"given":"Shiying","family":"Yao","sequence":"additional","affiliation":[{"name":"State Grid Sichuan Economic Research Institute Chengdu"}]},{"given":"Jijun","family":"Gou","sequence":"additional","affiliation":[{"name":"State Grid Sichuan Economic Research Institute Chengdu"}]},{"given":"Lisha","family":"Shuai","sequence":"additional","affiliation":[{"name":"University of Science &amp; Technology Beijing"}]},{"given":"Yu","family":"Cao","sequence":"additional","affiliation":[{"name":"University of Science &amp; Technology Beijing"}]}],"member":"320","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"issue":"03","key":"e_1_3_2_1_1_1","first-page":"22","article-title":"Ubiquitous power internet construction outline (Excerpt)","volume":"294","author":"State Grid Internet Department (Text\/map).","year":"2019","unstructured":"State Grid Internet Department (Text\/map). 2019 . Ubiquitous power internet construction outline (Excerpt) . North China Electric Power , 294 ( 03 ): 22 -- 31 .DIO= http:\/\/doi.acm.org\/CNKI:SUN:HBDY.0.2019-03-009 State Grid Internet Department (Text\/map). 2019. Ubiquitous power internet construction outline (Excerpt). North China Electric Power, 294(03):22--31.DIO= http:\/\/doi.acm.org\/CNKI:SUN:HBDY.0.2019-03-009","journal-title":"North China Electric Power"},{"key":"e_1_3_2_1_2_1","volume-title":"ZhaoYingjie et al","author":"YangTing","year":"2019","unstructured":"YangTing , ZhaiFeng , ZhaoYingjie et al . 2019 . Interpretation and Research Prospect of Ubiquitous Power Internet of Things. Automation of Electric Power Systems ( 13). YangTing, ZhaiFeng, ZhaoYingjie et al. 2019. Interpretation and Research Prospect of Ubiquitous Power Internet of Things. Automation of Electric Power Systems (13)."},{"key":"e_1_3_2_1_3_1","unstructured":"GongRui. 2019. Analysis of key technologies and application prospects of ubiquitous power Internet of Things. Communication world 26(08):252--253.  GongRui. 2019. Analysis of key technologies and application prospects of ubiquitous power Internet of Things. Communication world 26(08):252--253."},{"key":"e_1_3_2_1_4_1","unstructured":"LiaoHuimin XuanJiaxing ZhenPing LiLili. 2019. Overview of ubiquitous power Internet of Things information security. Electric power information and communication technology 17(08):18--23. DIO=http:\/\/doi.acm.org\/10.16543\/j.2095-641x.electric.power.ict.2019.08.004  LiaoHuimin XuanJiaxing ZhenPing LiLili. 2019. Overview of ubiquitous power Internet of Things information security. Electric power information and communication technology 17(08):18--23. DIO=http:\/\/doi.acm.org\/10.16543\/j.2095-641x.electric.power.ict.2019.08.004"},{"key":"e_1_3_2_1_5_1","volume-title":"ZhouBowen et al","author":"YangDongsheng","year":"2019","unstructured":"YangDongsheng , WangDaohao , ZhouBowen et al . 2019 . Key technologies and application prospects of ubiquitous power internet of things. Power generation technology, 40(02):13--20. YangDongsheng, WangDaohao, ZhouBowen et al. 2019. Key technologies and application prospects of ubiquitous power internet of things. Power generation technology, 40(02):13--20."},{"key":"e_1_3_2_1_6_1","unstructured":"YuZhuozhi LuBin LiuJunyu ChenWenwei DengWei ZhengWeijun. 2019. LTE230 Research on power wireless network private network encryption module.HeiLongjiang electric power 41(03):250--254.  YuZhuozhi LuBin LiuJunyu ChenWenwei DengWei ZhengWeijun. 2019. LTE230 Research on power wireless network private network encryption module.HeiLongjiang electric power 41(03):250--254."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09)","author":"Rakesh Bobba","year":"2009","unstructured":"Rakesh Bobba , Himanshu Khurana, Musab AlTurki , and Farhana Ashraf. 2009 . PBES: a policy based encryption system with application to data sharing in the power grid . In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09) . ACM, New York, NY, USA, 262--275. DOI=http:\/\/dx.doi.org\/10.1145\/1533057.1533093 10.1145\/1533057.1533093 Rakesh Bobba, Himanshu Khurana, Musab AlTurki, and Farhana Ashraf. 2009. PBES: a policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09). ACM, New York, NY, USA, 262--275. DOI=http:\/\/dx.doi.org\/10.1145\/1533057.1533093"},{"volume-title":"SIAM Journal on Computing, (Feb","author":"Cramer V.","key":"e_1_3_2_1_8_1","unstructured":"R. Cramer and V. Shoup . 2004. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack . SIAM Journal on Computing, (Feb , 2004)33(1): 167--226.DIO= http:\/\/doi.acm.org\/ 10.1137\/s0097539702403773 R. Cramer and V. Shoup. 2004. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing, (Feb, 2004)33(1): 167--226.DIO= http:\/\/doi.acm.org\/ 10.1137\/s0097539702403773"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273889"},{"key":"e_1_3_2_1_10_1","volume-title":"Secure information aggregation for smart grids using homomorphic encryption.In 2010 First IEEE International Conference on Smart Grid Communications","author":"Li F","year":"2010","unstructured":"Li F , Luo B , Liu P. 2010. Secure information aggregation for smart grids using homomorphic encryption.In 2010 First IEEE International Conference on Smart Grid Communications . IEEE , Gaithersburg, Maryland, USA : 327--332.DIO= http:\/\/doi.acm.org\/10.1109\/SMARTGRID. 2010 .5622064 Li F, Luo B, Liu P. 2010. Secure information aggregation for smart grids using homomorphic encryption.In 2010 First IEEE International Conference on Smart Grid Communications. IEEE, Gaithersburg, Maryland, USA: 327--332.DIO= http:\/\/doi.acm.org\/10.1109\/SMARTGRID.2010.5622064"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417140"},{"key":"e_1_3_2_1_13_1","volume-title":"EPIC: Efficient Privacy-Preserving Scheme with EtoE Data Integrity and Authenticity for AMI Networks. DIO= http:\/\/doi.acm.org\/ 10.1109\/JIOT.2018.2882566","author":"Alsharif A","year":"2018","unstructured":"Alsharif A , Nabil M , Tonyali S , 2018 . EPIC: Efficient Privacy-Preserving Scheme with EtoE Data Integrity and Authenticity for AMI Networks. DIO= http:\/\/doi.acm.org\/ 10.1109\/JIOT.2018.2882566 Alsharif A, Nabil M, Tonyali S, et al. 2018. EPIC: Efficient Privacy-Preserving Scheme with EtoE Data Integrity and Authenticity for AMI Networks. DIO= http:\/\/doi.acm.org\/ 10.1109\/JIOT.2018.2882566"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Lu R Alharbi K Lin X etal 2014. A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications.GLOBECOM 2015-2015 IEEE Global Communications Conference. IEEE San Diego California USA. DIO= http:\/\/doi.acm.org\/ 10.1109\/GLOCOM.2014.7417029  Lu R Alharbi K Lin X et al. 2014. A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications.GLOBECOM 2015-2015 IEEE Global Communications Conference. IEEE San Diego California USA. DIO= http:\/\/doi.acm.org\/ 10.1109\/GLOCOM.2014.7417029","DOI":"10.1109\/GLOCOM.2014.7417029"},{"key":"e_1_3_2_1_16_1","volume-title":"Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, Proceedings. Springer-Verlag","author":"Boneh D","year":"2005","unstructured":"Boneh D , Goh E J , Nissim K. 2005 . Evaluating 2-DNF Formulas on Ciphertexts. Theory of Cryptography , Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, Proceedings. Springer-Verlag , 2005. DIO= http:\/\/doi.acm.org\/10.1007\/978-3-540-30576-7_18 Boneh D, Goh E J, Nissim K. 2005. Evaluating 2-DNF Formulas on Ciphertexts. Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, Proceedings. Springer-Verlag, 2005. DIO= http:\/\/doi.acm.org\/10.1007\/978-3-540-30576-7_18"},{"volume-title":"Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI '19)","author":"Mohit Vashistha A.","key":"e_1_3_2_1_17_1","unstructured":"Mohit Vashistha and Ferdous A. Barbhuiya . 2019. Blockchain in Smart Power Grid Infrastructure . In Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI '19) . ACM, New York, NY, USA, 89--96. DOI=https:\/\/doi.org\/10.1145\/3327960.3332388 10.1145\/3327960.3332388 Mohit Vashistha and Ferdous A. Barbhuiya. 2019. Blockchain in Smart Power Grid Infrastructure. In Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI '19). ACM, New York, NY, USA, 89--96. DOI=https:\/\/doi.org\/10.1145\/3327960.3332388"}],"event":{"name":"CSAI2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Normal IL USA","acronym":"CSAI2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374587.3374631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:45Z","timestamp":1750203885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,6]]},"references-count":17,"alternative-id":["10.1145\/3374587.3374631","10.1145\/3374587"],"URL":"https:\/\/doi.org\/10.1145\/3374587.3374631","relation":{},"subject":[],"published":{"date-parts":[[2019,12,6]]},"assertion":[{"value":"2020-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}