{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:35Z","timestamp":1725533615758},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_69","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T14:22:04Z","timestamp":1245248524000},"page":"682-691","source":"Crossref","is-referenced-by-count":1,"title":["A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment"],"prefix":"10.1007","author":[{"given":"Firdous","family":"Kausar","sequence":"first","affiliation":[]},{"given":"Ayesha","family":"Naureen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","doi-asserted-by":"crossref","unstructured":"Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient implementation of estream ciphers on 8-bit avr microcontrollers. In: Industrial Embedded systems, 2008. SIES 2008, pp. 58\u201366 (2008)","DOI":"10.1109\/SIES.2008.4577681"},{"issue":"6","key":"69_CR2","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T. Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Design and Test of Computers\u00a024(6), 522\u2013533 (2007)","journal-title":"IEEE Design and Test of Computers"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Fournel, N., Minier, M., Ubeda, S.: Survey and benchmark of stream ciphers for wireless sensor networks. In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, pp. 202\u2013214 (2007)","DOI":"10.1007\/978-3-540-72354-7_17"},{"key":"69_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A new version of the stream cipher snow. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"69_CR5","unstructured":"Lim, S.Y., Pu, C.C., Lim, H.T., Lee, H.J.: Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption, http:\/\/eprint.iacr.org\/2007\/204.pdf"},{"key":"69_CR6","unstructured":"The eSTREAM Project, http:\/\/www.ecrypt.eu.org\/stream\/"},{"key":"69_CR7","unstructured":"Stream cipher From Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Stream_cipher"},{"key":"69_CR8","unstructured":"Wu, H.: The Stream Cipher HC-128. ECRYPT Stream Cipher Project Report 2005\/001 (2005)"},{"key":"69_CR9","unstructured":"Boesgaard, M., Vesterager, M., Christensen, T., Zenner, E.: The Stream Cipher Rabbit. eSTREAM, ECRYPT Stream Cipher Project Report 2005\/001 (2005)"},{"key":"69_CR10","doi-asserted-by":"crossref","unstructured":"Gay, D., Levis, P., Culler, D., Brewer, E.: nesC 1.1 Language Reference Manual (May 2003), http:\/\/www.tinyos.net\/tinyos-1.x\/doc\/nesc\/ref.pdf","DOI":"10.1145\/780822.781133"},{"key":"69_CR11","unstructured":"Easwaran, A.: TinyOS: Operating System for Sensor Networks., CIS 640: Embedded Systems Seminar, Spring, University of Pennsylvania (Spring 2004)"},{"key":"69_CR12","unstructured":"Crossbow Technology Inc., Processor\/Radio Modules, http:\/\/www.xbow.com , http:\/\/www.xbow.com"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:36:10Z","timestamp":1558395370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}