{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:05:31Z","timestamp":1726848331240},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["STPGP 396838"],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/jsyst.2013.2260942","type":"journal-article","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T18:40:47Z","timestamp":1372963247000},"page":"629-640","source":"Crossref","is-referenced-by-count":156,"title":["Efficient Authentication and Key Management Mechanisms for Smart Grid Communications"],"prefix":"10.1109","volume":"8","author":[{"given":"Hasen","family":"Nicanfar","sequence":"first","affiliation":[]},{"given":"Paria","family":"Jokar","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[]},{"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990724"},{"key":"ref11","first-page":"407","article-title":"Verifier-based Password Authenticated Key Exchange protocol via elliptic curve","author":"zhang","year":"0","journal-title":"Proc of IEEE ICIT"},{"key":"ref12","first-page":"97","article-title":"The Secure Remote Password protocol","author":"wu","year":"0","journal-title":"Proc Internet Soc Symp Netw Distrib Syst Security"},{"key":"ref13","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Advances in CryptologyProc CRYPTO 1984"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology CRYPTO 2001"},{"key":"ref15","author":"wu","year":"0","journal-title":"SRP-6 Improvements and Refinements to the Secure Remote Password Protocol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon.2012.6189541"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2158671"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162375"},{"key":"ref19","first-page":"1","article-title":"Secure authenticated key exchange with revocation for smart grid","author":"zhao","year":"0","journal-title":"Proc IEEE PES ISGT"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2011.5723144"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5280"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-Asia.2011.6167151"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2123851"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"ref9","first-page":"72","article-title":"Encrypted key exchange: Password-based protocols secure against dictionary attacks","author":"bellovin","year":"0","journal-title":"Proc IEEE Comput Soc Symp Res Security Privacy"},{"key":"ref1","year":"2010","journal-title":"Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security"},{"key":"ref20","first-page":"1","article-title":"Secure and efficient cryptosystem for smart grid using homomorphic encryption","author":"he","year":"0","journal-title":"Proc IEEE PES ISGT"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214259"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2199141"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257524"},{"key":"ref23","first-page":"1","article-title":"Biometric authentication in smart grid","author":"gao","year":"0","journal-title":"Proc IES"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref25","year":"0","journal-title":"AVISPA-Automated Validation of Internet Security Protocols"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/6819870\/06553352.pdf?arnumber=6553352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:17:45Z","timestamp":1642004265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6553352\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":26,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2013.2260942","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6]]}}}