A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-04

AUTHORS

Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li

ABSTRACT

Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie–Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model. More... »

PAGES

491-510

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11235-018-0530-5

DOI

http://dx.doi.org/10.1007/s11235-018-0530-5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1110097931


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Electronic Science and Technology of China", 
          "id": "https://www.grid.ac/institutes/grid.54549.39", 
          "name": [
            "Center for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, 611731, Chengdu, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ahene", 
        "givenName": "Emmanuel", 
        "id": "sg:person.014116411302.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014116411302.86"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "State Grid Hubei Electric Power Company, 430077, Wuhan, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dai", 
        "givenName": "Junfeng", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "State Grid Hubei Electric Power Company, 430077, Wuhan, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Feng", 
        "givenName": "Hao", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Electronic Science and Technology of China", 
          "id": "https://www.grid.ac/institutes/grid.54549.39", 
          "name": [
            "Center for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, 611731, Chengdu, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Li", 
        "givenName": "Fagen", 
        "id": "sg:person.016114744521.15", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016114744521.15"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/s10916-016-0615-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001385737", 
          "https://doi.org/10.1007/s10916-016-0615-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10916-016-0615-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001385737", 
          "https://doi.org/10.1007/s10916-016-0615-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.ins.2010.09.037", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001501051"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23418-7_28", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006770676", 
          "https://doi.org/10.1007/978-3-642-23418-7_28"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23418-7_28", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006770676", 
          "https://doi.org/10.1007/978-3-642-23418-7_28"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-36563-x_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007165852", 
          "https://doi.org/10.1007/3-540-36563-x_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-36563-x_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007165852", 
          "https://doi.org/10.1007/3-540-36563-x_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-72738-5_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009163646", 
          "https://doi.org/10.1007/978-3-540-72738-5_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-72738-5_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009163646", 
          "https://doi.org/10.1007/978-3-540-72738-5_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-30580-4_25", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009925145", 
          "https://doi.org/10.1007/978-3-540-30580-4_25"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-30580-4_25", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009925145", 
          "https://doi.org/10.1007/978-3-540-30580-4_25"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.ins.2011.11.045", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1012264079"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1368310.1368364", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1018086989"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s001450010003", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1018357720", 
          "https://doi.org/10.1007/s001450010003"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-45146-4_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020674204", 
          "https://doi.org/10.1007/978-3-540-45146-4_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-45146-4_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020674204", 
          "https://doi.org/10.1007/978-3-540-45146-4_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/access.2015.2502250", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026958586"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1456520.1456531", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039009862"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.ins.2009.10.011", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039711499"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11227-013-1055-z", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041631863", 
          "https://doi.org/10.1007/s11227-013-1055-z"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-11203-9_15", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048064452", 
          "https://doi.org/10.1007/978-3-319-11203-9_15"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.ins.2012.04.013", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051236963"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/jcn.2009.6388413", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061277855"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/jiot.2015.2460333", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061280757"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2013.2271848", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061630180"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tii.2014.2306384", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061632458"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tkde.2011.78", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061662492"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tkde.2012.180", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061662559"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpds.2012.97", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061754196"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpds.2013.253", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061754390"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpds.2013.271", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061754408"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tsg.2015.2505325", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061790820"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tvt.2012.2186992", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061821177"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00607-017-0548-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1084022986", 
          "https://doi.org/10.1007/s00607-017-0548-7"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00607-017-0548-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1084022986", 
          "https://doi.org/10.1007/s00607-017-0548-7"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/jsen.2017.2760014", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1092104739"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/infcom.2010.5462174", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094231634"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/cis.2011.200", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094303706"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/csae.2011.5952478", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094585905"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/isise.2008.206", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095317035"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/isise.2008.206", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095317035"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/wcins.2010.5541841", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095353332"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/cloud.2009.65", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095449031"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/jiot.2017.2781251", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1099648575"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-97719-5_1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1105878899", 
          "https://doi.org/10.1007/978-3-319-97719-5_1"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2019-04", 
    "datePublishedReg": "2019-04-01", 
    "description": "Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie\u2013Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s11235-018-0530-5", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1049187", 
        "issn": [
          "1018-4864", 
          "1572-9451"
        ], 
        "name": "Telecommunication Systems", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "4", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "70"
      }
    ], 
    "name": "A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid", 
    "pagination": "491-510", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "3db852f12012fe5759bb7126927413e835c6115058dca836a43839f2436fe163"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11235-018-0530-5"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1110097931"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11235-018-0530-5", 
      "https://app.dimensions.ai/details/publication/pub.1110097931"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T13:04", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000366_0000000366/records_112045_00000000.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1007%2Fs11235-018-0530-5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0530-5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0530-5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0530-5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11235-018-0530-5'


 

This table displays all metadata directly associated to this object as RDF triples.

206 TRIPLES      21 PREDICATES      64 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11235-018-0530-5 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N5eb9dbe483f649ecb23fa0ac11827ff9
4 schema:citation sg:pub.10.1007/3-540-36563-x_14
5 sg:pub.10.1007/978-3-319-11203-9_15
6 sg:pub.10.1007/978-3-319-97719-5_1
7 sg:pub.10.1007/978-3-540-30580-4_25
8 sg:pub.10.1007/978-3-540-45146-4_23
9 sg:pub.10.1007/978-3-540-72738-5_19
10 sg:pub.10.1007/978-3-642-23418-7_28
11 sg:pub.10.1007/s001450010003
12 sg:pub.10.1007/s00607-017-0548-7
13 sg:pub.10.1007/s10916-016-0615-1
14 sg:pub.10.1007/s11227-013-1055-z
15 https://doi.org/10.1016/j.ins.2009.10.011
16 https://doi.org/10.1016/j.ins.2010.09.037
17 https://doi.org/10.1016/j.ins.2011.11.045
18 https://doi.org/10.1016/j.ins.2012.04.013
19 https://doi.org/10.1109/access.2015.2502250
20 https://doi.org/10.1109/cis.2011.200
21 https://doi.org/10.1109/cloud.2009.65
22 https://doi.org/10.1109/csae.2011.5952478
23 https://doi.org/10.1109/infcom.2010.5462174
24 https://doi.org/10.1109/isise.2008.206
25 https://doi.org/10.1109/jcn.2009.6388413
26 https://doi.org/10.1109/jiot.2015.2460333
27 https://doi.org/10.1109/jiot.2017.2781251
28 https://doi.org/10.1109/jsen.2017.2760014
29 https://doi.org/10.1109/tifs.2013.2271848
30 https://doi.org/10.1109/tii.2014.2306384
31 https://doi.org/10.1109/tkde.2011.78
32 https://doi.org/10.1109/tkde.2012.180
33 https://doi.org/10.1109/tpds.2012.97
34 https://doi.org/10.1109/tpds.2013.253
35 https://doi.org/10.1109/tpds.2013.271
36 https://doi.org/10.1109/tsg.2015.2505325
37 https://doi.org/10.1109/tvt.2012.2186992
38 https://doi.org/10.1109/wcins.2010.5541841
39 https://doi.org/10.1145/1368310.1368364
40 https://doi.org/10.1145/1456520.1456531
41 schema:datePublished 2019-04
42 schema:datePublishedReg 2019-04-01
43 schema:description Cloud computing has proven to be applicable in smart grid systems with the help of the cloud-based Internet of things (IoT) technology. In this concept, IoT is deployed as a front-end enabling the acquisition of smart grid-related data and its outsourcing to the cloud for data storage purposes. It is obvious that data storage is a pertinent service in cloud computing. However, its wide adoption is hindered by the concern of having a secure access to data without a breach on confidentiality and authentication. To address this problem, we propose a novel data access control scheme that simultaneously accomplishes confidentiality and authentication for cloud-based smart grid systems. Our scheme can enable the storing of encrypted smart grid-related data in the cloud. When a user prefers to access the data, the data owner issues a delegation command to the cloud for data re-encryption. The cloud is unable to acquire any plaintext information on the data. Only authorized users are capable of decrypting the data. Moreover, the integrity and authentication of data can only be verified by the authorized user. We obtain the data access control scheme by proposing a pairing free certificateless signcryption with proxy re-encryption (CLS-PRE) scheme. We prove that our CLS-PRE scheme has indistinguishability against adaptive chosen ciphertext attack under the gap Diffie–Hellman problem and existential unforgeability against adaptive chosen message attack under elliptic curve discrete logarithm problem in the random oracle model.
44 schema:genre research_article
45 schema:inLanguage en
46 schema:isAccessibleForFree false
47 schema:isPartOf Nf1d2e43cf40544929900c463367b7af0
48 Nfc97082eb27f40e6b897c58dcea0b6bc
49 sg:journal.1049187
50 schema:name A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid
51 schema:pagination 491-510
52 schema:productId N2d6a149962c24d23af8682f92dfbcfe0
53 N9641d52853a449f8a23fd240340fc73f
54 Nb4109891dd0d4b4c9d4742df1bf96178
55 schema:sameAs https://app.dimensions.ai/details/publication/pub.1110097931
56 https://doi.org/10.1007/s11235-018-0530-5
57 schema:sdDatePublished 2019-04-11T13:04
58 schema:sdLicense https://scigraph.springernature.com/explorer/license/
59 schema:sdPublisher N0dba66ab1ffe4d17890bc798d92a3ba6
60 schema:url https://link.springer.com/10.1007%2Fs11235-018-0530-5
61 sgo:license sg:explorer/license/
62 sgo:sdDataset articles
63 rdf:type schema:ScholarlyArticle
64 N0dba66ab1ffe4d17890bc798d92a3ba6 schema:name Springer Nature - SN SciGraph project
65 rdf:type schema:Organization
66 N2d6a149962c24d23af8682f92dfbcfe0 schema:name readcube_id
67 schema:value 3db852f12012fe5759bb7126927413e835c6115058dca836a43839f2436fe163
68 rdf:type schema:PropertyValue
69 N48c02d8d6b214a3da7e51d02b473dbfc schema:affiliation N643739776b564658a281b5603acc8294
70 schema:familyName Feng
71 schema:givenName Hao
72 rdf:type schema:Person
73 N4aa0729b4eba4597a4f7db2676de1fe2 schema:affiliation Na85128252d5c437885db9353d844ea72
74 schema:familyName Dai
75 schema:givenName Junfeng
76 rdf:type schema:Person
77 N4d1724e0f237489f8c7deb23a6cd9438 rdf:first N48c02d8d6b214a3da7e51d02b473dbfc
78 rdf:rest N4e7f5e94564a4637acf41e0bab4f843e
79 N4e7f5e94564a4637acf41e0bab4f843e rdf:first sg:person.016114744521.15
80 rdf:rest rdf:nil
81 N5eb9dbe483f649ecb23fa0ac11827ff9 rdf:first sg:person.014116411302.86
82 rdf:rest N83919ea3f15a4fbca7c62d4c5073f371
83 N643739776b564658a281b5603acc8294 schema:name State Grid Hubei Electric Power Company, 430077, Wuhan, People’s Republic of China
84 rdf:type schema:Organization
85 N83919ea3f15a4fbca7c62d4c5073f371 rdf:first N4aa0729b4eba4597a4f7db2676de1fe2
86 rdf:rest N4d1724e0f237489f8c7deb23a6cd9438
87 N9641d52853a449f8a23fd240340fc73f schema:name doi
88 schema:value 10.1007/s11235-018-0530-5
89 rdf:type schema:PropertyValue
90 Na85128252d5c437885db9353d844ea72 schema:name State Grid Hubei Electric Power Company, 430077, Wuhan, People’s Republic of China
91 rdf:type schema:Organization
92 Nb4109891dd0d4b4c9d4742df1bf96178 schema:name dimensions_id
93 schema:value pub.1110097931
94 rdf:type schema:PropertyValue
95 Nf1d2e43cf40544929900c463367b7af0 schema:volumeNumber 70
96 rdf:type schema:PublicationVolume
97 Nfc97082eb27f40e6b897c58dcea0b6bc schema:issueNumber 4
98 rdf:type schema:PublicationIssue
99 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
100 schema:name Information and Computing Sciences
101 rdf:type schema:DefinedTerm
102 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
103 schema:name Artificial Intelligence and Image Processing
104 rdf:type schema:DefinedTerm
105 sg:journal.1049187 schema:issn 1018-4864
106 1572-9451
107 schema:name Telecommunication Systems
108 rdf:type schema:Periodical
109 sg:person.014116411302.86 schema:affiliation https://www.grid.ac/institutes/grid.54549.39
110 schema:familyName Ahene
111 schema:givenName Emmanuel
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014116411302.86
113 rdf:type schema:Person
114 sg:person.016114744521.15 schema:affiliation https://www.grid.ac/institutes/grid.54549.39
115 schema:familyName Li
116 schema:givenName Fagen
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016114744521.15
118 rdf:type schema:Person
119 sg:pub.10.1007/3-540-36563-x_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007165852
120 https://doi.org/10.1007/3-540-36563-x_14
121 rdf:type schema:CreativeWork
122 sg:pub.10.1007/978-3-319-11203-9_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048064452
123 https://doi.org/10.1007/978-3-319-11203-9_15
124 rdf:type schema:CreativeWork
125 sg:pub.10.1007/978-3-319-97719-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1105878899
126 https://doi.org/10.1007/978-3-319-97719-5_1
127 rdf:type schema:CreativeWork
128 sg:pub.10.1007/978-3-540-30580-4_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009925145
129 https://doi.org/10.1007/978-3-540-30580-4_25
130 rdf:type schema:CreativeWork
131 sg:pub.10.1007/978-3-540-45146-4_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020674204
132 https://doi.org/10.1007/978-3-540-45146-4_23
133 rdf:type schema:CreativeWork
134 sg:pub.10.1007/978-3-540-72738-5_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009163646
135 https://doi.org/10.1007/978-3-540-72738-5_19
136 rdf:type schema:CreativeWork
137 sg:pub.10.1007/978-3-642-23418-7_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006770676
138 https://doi.org/10.1007/978-3-642-23418-7_28
139 rdf:type schema:CreativeWork
140 sg:pub.10.1007/s001450010003 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018357720
141 https://doi.org/10.1007/s001450010003
142 rdf:type schema:CreativeWork
143 sg:pub.10.1007/s00607-017-0548-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084022986
144 https://doi.org/10.1007/s00607-017-0548-7
145 rdf:type schema:CreativeWork
146 sg:pub.10.1007/s10916-016-0615-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001385737
147 https://doi.org/10.1007/s10916-016-0615-1
148 rdf:type schema:CreativeWork
149 sg:pub.10.1007/s11227-013-1055-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1041631863
150 https://doi.org/10.1007/s11227-013-1055-z
151 rdf:type schema:CreativeWork
152 https://doi.org/10.1016/j.ins.2009.10.011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039711499
153 rdf:type schema:CreativeWork
154 https://doi.org/10.1016/j.ins.2010.09.037 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001501051
155 rdf:type schema:CreativeWork
156 https://doi.org/10.1016/j.ins.2011.11.045 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012264079
157 rdf:type schema:CreativeWork
158 https://doi.org/10.1016/j.ins.2012.04.013 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051236963
159 rdf:type schema:CreativeWork
160 https://doi.org/10.1109/access.2015.2502250 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026958586
161 rdf:type schema:CreativeWork
162 https://doi.org/10.1109/cis.2011.200 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094303706
163 rdf:type schema:CreativeWork
164 https://doi.org/10.1109/cloud.2009.65 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095449031
165 rdf:type schema:CreativeWork
166 https://doi.org/10.1109/csae.2011.5952478 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094585905
167 rdf:type schema:CreativeWork
168 https://doi.org/10.1109/infcom.2010.5462174 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094231634
169 rdf:type schema:CreativeWork
170 https://doi.org/10.1109/isise.2008.206 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095317035
171 rdf:type schema:CreativeWork
172 https://doi.org/10.1109/jcn.2009.6388413 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061277855
173 rdf:type schema:CreativeWork
174 https://doi.org/10.1109/jiot.2015.2460333 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061280757
175 rdf:type schema:CreativeWork
176 https://doi.org/10.1109/jiot.2017.2781251 schema:sameAs https://app.dimensions.ai/details/publication/pub.1099648575
177 rdf:type schema:CreativeWork
178 https://doi.org/10.1109/jsen.2017.2760014 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092104739
179 rdf:type schema:CreativeWork
180 https://doi.org/10.1109/tifs.2013.2271848 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061630180
181 rdf:type schema:CreativeWork
182 https://doi.org/10.1109/tii.2014.2306384 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061632458
183 rdf:type schema:CreativeWork
184 https://doi.org/10.1109/tkde.2011.78 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061662492
185 rdf:type schema:CreativeWork
186 https://doi.org/10.1109/tkde.2012.180 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061662559
187 rdf:type schema:CreativeWork
188 https://doi.org/10.1109/tpds.2012.97 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061754196
189 rdf:type schema:CreativeWork
190 https://doi.org/10.1109/tpds.2013.253 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061754390
191 rdf:type schema:CreativeWork
192 https://doi.org/10.1109/tpds.2013.271 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061754408
193 rdf:type schema:CreativeWork
194 https://doi.org/10.1109/tsg.2015.2505325 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061790820
195 rdf:type schema:CreativeWork
196 https://doi.org/10.1109/tvt.2012.2186992 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061821177
197 rdf:type schema:CreativeWork
198 https://doi.org/10.1109/wcins.2010.5541841 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095353332
199 rdf:type schema:CreativeWork
200 https://doi.org/10.1145/1368310.1368364 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018086989
201 rdf:type schema:CreativeWork
202 https://doi.org/10.1145/1456520.1456531 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039009862
203 rdf:type schema:CreativeWork
204 https://www.grid.ac/institutes/grid.54549.39 schema:alternateName University of Electronic Science and Technology of China
205 schema:name Center for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, 611731, Chengdu, People’s Republic of China
206 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...