{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:54:15Z","timestamp":1743011655787,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7036884","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T14:54:30Z","timestamp":1424184870000},"page":"668-674","source":"Crossref","is-referenced-by-count":18,"title":["A lightweight lattice-based security and privacy-preserving scheme for smart grid"],"prefix":"10.1109","author":[{"given":"Asmaa R.","family":"Abdallah","sequence":"first","affiliation":[]},{"given":"Xuemin Sherman","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257525"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.124"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2224389"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2012.00026"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257527"},{"key":"14","article-title":"Achieving accountability in smart grid","author":"liu","year":"0","journal-title":"IEEE Systems Journal"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6194396"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2271537"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160661"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260942"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2277938"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130716"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257522"},{"key":"26","first-page":"27","article-title":"Making NTRU as Secure as Worst-Case Problems over Ideal Lattices","author":"stehl\ufffd","year":"2011","journal-title":"Proc EUROCRYPT"},{"key":"27","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1007\/978-1-4419-5906-5_434","author":"micciancio","year":"2011","journal-title":"Shortest Vector Problem Encyclopedia of Cryptography and Security"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2012.31"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400441"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00145"},{"key":"2","article-title":"Communication network requirements for major smart grid applications in HAN NAN and WAN","author":"kuzlu","year":"2013","journal-title":"Elsevier Editorial System for Computer Networks"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2260937"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"year":"0","key":"30"},{"key":"7","article-title":"Student member, ieee, and lei wu, residential appliance dr energy management with electric privacy protection by online stochastic optimization","author":"chen","year":"0","journal-title":"IEEE Transactions on Smart Grid"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130715"},{"key":"32","first-page":"122","article-title":"NTRUSign: Digital signatures using the ntru lattice","author":"hoffstein","year":"2003","journal-title":"Proc CT-RSA"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"31","first-page":"211","article-title":"NTRU: A public key cryptosystem","author":"hoffstein","year":"2001","journal-title":"Proc EUROCRYPT"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228343"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2211046"},{"key":"8","first-page":"67","article-title":"A distortion-based approach to privacy-preserving metering in smart grids","volume":"1","author":"he","year":"2013","journal-title":"IEEE Access Practical Innovations Open Solutions"}],"event":{"name":"GLOBECOM 2014 - 2014 IEEE Global Communications Conference","start":{"date-parts":[[2014,12,8]]},"location":"Austin, TX, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008954\/7036769\/07036884.pdf?arnumber=7036884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T22:51:00Z","timestamp":1598741460000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7036884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7036884","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}