{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:13:05Z","timestamp":1729653185518,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/smartgridcomm.2013.6687999","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T13:37:57Z","timestamp":1388756277000},"page":"450-455","source":"Crossref","is-referenced-by-count":4,"title":["Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures"],"prefix":"10.1109","author":[{"given":"Robin","family":"Berthier","sequence":"first","affiliation":[]},{"given":"Jorjeta G.","family":"Jetcheva","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Mashima","sequence":"additional","affiliation":[]},{"given":"Jun Ho","family":"Huh","sequence":"additional","affiliation":[]},{"given":"David","family":"Grochocki","sequence":"additional","affiliation":[]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[]},{"given":"Alvaro A.","family":"Cardenas","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920277"},{"journal-title":"Reactive Discovery of Point-to-point Routes in Low Power and Lossy Networks","year":"2012","author":"martocci","key":"17"},{"key":"18","first-page":"176","article-title":"Energy theft in the advanced metering infrastructure","author":"mclaughlin","year":"2009","journal-title":"4th International Conference on Critical Information Infrastructures Security (CRITIS) Proc"},{"journal-title":"Analysing Zigbee Key Establishment Protocols","year":"2012","author":"yu?ksel","key":"33"},{"journal-title":"A Standardized and Flexible IPv6 Architecture for Field Area Networks","year":"2011","author":"kopmeiners","key":"15"},{"key":"34","first-page":"65","article-title":"Zigbee-2007 security essentials","author":"yu?ksel","year":"2008","journal-title":"Proc 13th Nordic Workshop on Secure IT-systems"},{"journal-title":"Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI)","year":"2012","author":"lee","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486016"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080119"},{"journal-title":"Efficient Encryption and Key Management in Advanced Metering Infrastructure","year":"2011","author":"ganguly","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2010.031286"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"20","article-title":"Flow attributes for use in traffic characterization","author":"montigny-leboeuf","year":"2005","journal-title":"Technical Report CRC-TN-2005-003"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486004"},{"key":"23","first-page":"334","article-title":"On the secrecy of timing-based active watermarking trace-back techniques","author":"peng","year":"2006","journal-title":"Proc IEEE Symp Security and Privacy (S&P"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"journal-title":"Constrained Application Protocol (CoAP)","year":"2013","author":"shelby","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT.2012.6175564"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/PSAMP.2007.4740906"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.313"},{"key":"29","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/1102120.1102133","article-title":"Tracking anonymous peer-to-peer VoIP calls on the internet","author":"wang","year":"2005","journal-title":"12th ACM Conference on Computer and Communications Security (CCS) Proc"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71617-4_17"},{"key":"2","first-page":"1","article-title":"Distributed non-intrusive load monitoring. In innovative smart grid technologies (ISGT)","author":"bergman","year":"2011","journal-title":"2011 IEEE PES Proc"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45708-9_23","article-title":"Efficient algorithms for pairing-based cryptosystems","volume":"2442","author":"barreto","year":"2002","journal-title":"Advances in Cryptology - Crypto 2002"},{"key":"10","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-36084-0_2","article-title":"Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay","author":"donoho","year":"2002","journal-title":"Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.34"},{"journal-title":"Depth-first Forwarding in Unreliable Networks (DFF)","year":"2013","author":"cespedes","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2011.30"},{"key":"32","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1145\/1755688.1755720","article-title":"Attribute based data sharing with attribute revocation","author":"yu","year":"2010","journal-title":"Proceedings of the 5th ACM Symposium on Information Computer and Communications Security ASIACCS '10"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"31","article-title":"RPL: IPv6 routing protocol for low-power and lossy networks","author":"winter","year":"2012","journal-title":"RFC 6550 (Proposed Standard)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"journal-title":"Architecture and Protocols","year":"2007","key":"9"},{"journal-title":"The Lightweight On-demand Ad Hoc Distance-vector Routing Protocol-next Generation (LOADng)","year":"2013","author":"clausen","key":"8"}],"event":{"name":"2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)","start":{"date-parts":[[2013,10,21]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2013,10,24]]}},"container-title":["2013 IEEE International Conference on Smart Grid Communications (SmartGridComm)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6678912\/6687920\/06687999.pdf?arnumber=6687999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:14:11Z","timestamp":1498094051000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6687999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/smartgridcomm.2013.6687999","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}