{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:37:30Z","timestamp":1729654650499,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/msn.2013.64","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T18:35:09Z","timestamp":1391193309000},"page":"405-409","source":"Crossref","is-referenced-by-count":1,"title":["The Evaluation of Security Algorithms on Mobile Platform"],"prefix":"10.1109","author":[{"given":"Hong","family":"Yao","sequence":"first","affiliation":[]},{"given":"Lu","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Qingzhong","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xuesong","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307713"},{"key":"15","first-page":"280","article-title":"Integrating classical encryption with modern technique[j]","volume":"280","author":"saeed","year":"2010","journal-title":"IJC International Journal of Computer"},{"journal-title":"SCanDroid Automated Security Certification of Android Applications","year":"2009","author":"fuchs","key":"16"},{"year":"0","key":"13"},{"key":"14","first-page":"50","article-title":"THE IDea encryption algorithm\\-The international data encryption algorithm (idea) may be one of the most secure block algorithms available to the public today bruce examines its 128-bit-long key[j]","volume":"18","author":"schneier","year":"1993","journal-title":"Dr Dobb s J Software Tools Prof Programmers"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3174"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ITAP.2011.6006288"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403026"},{"journal-title":"Google Android A State-of-the-art Review of Security Mechanisms","year":"2009","author":"shabtai","key":"1"},{"journal-title":"Use of Biometrics As A Methodology for Defining Components for ECC Encryption","year":"2001","author":"angelo","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"year":"0","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/35.925682","article-title":"Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks[J]","volume":"39","author":"toh","year":"2001","journal-title":"Communications Magazine IEEE"},{"key":"4","first-page":"2","article-title":"Economics security resource page[J","author":"anderson","year":"2005","journal-title":"Undated Web Page"},{"key":"9","first-page":"277","article-title":"Integrated design of aes (advanced encryption standard) encrypter decrypter[c]","author":"lu","year":"2002","journal-title":"Application-Specific Systems Architectures Processors 2002 Proceedings The IEEE International Conference On IEEE"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2003.1253591"}],"event":{"name":"2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)","start":{"date-parts":[[2013,12,11]]},"location":"Dalian, China","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6724377\/6726286\/06726365.pdf?arnumber=6726365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:05:27Z","timestamp":1498100727000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6726365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/msn.2013.64","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}