{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T17:31:16Z","timestamp":1687541476833},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T00:00:00Z","timestamp":1586476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11277-020-07268-4","type":"journal-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T19:02:35Z","timestamp":1586545355000},"page":"1073-1095","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Hybrid Addition Chaining Based Light Weight Security Mechanism for Enhancing Quality of Service in IoT"],"prefix":"10.1007","volume":"113","author":[{"given":"Asokan","family":"Jayaram","sequence":"first","affiliation":[]},{"given":"Sanjoy","family":"Deb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,10]]},"reference":[{"key":"7268_CR1","first-page":"17","volume":"1","author":"S Kapadnis","year":"2014","unstructured":"Kapadnis, S. (2014). Hierarchical attribute based encryption in cloud environment. International Journal of Computer Applications\u2014Innovations and Trends in Computer and Communication Engineering,1, 17\u201320.","journal-title":"International Journal of Computer Applications\u2014Innovations and Trends in Computer and Communication Engineering"},{"issue":"5","key":"7268_CR2","first-page":"294","volume":"3","author":"N Krishna","year":"2013","unstructured":"Krishna, N., & Bhavani, L. (2013). HASBE: A hierarchical attribute set based encryption for flexible, scalable and fine grained access control in cloud computing. International Journal of Computer & Organization Trends,3(5), 294\u2013301.","journal-title":"International Journal of Computer & Organization Trends"},{"issue":"5","key":"7268_CR3","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G Wang","year":"2011","unstructured":"Wang, G., Liu, Q., Jie, W., & Guo, M. (2011). Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Journal of Computers and Security,30(5), 320\u2013331.","journal-title":"Journal of Computers and Security"},{"key":"7268_CR4","first-page":"18","volume":"7","author":"NK Sreelesh","year":"2018","unstructured":"Sreelesh, N. K., & Santhosh, K. B. J. (2018). An advanced hierarchical attribute based encryption access control in mobile cloud computing. International Journal of Engineering & Technology,7, 18\u201322.","journal-title":"International Journal of Engineering & Technology"},{"key":"7268_CR5","unstructured":"Mahto, D., Khan, D. A., & Yadav, D. K. (2016). Security analysis of elliptic curve cryptography and RSA. The World Congress on Engineering, 1."},{"key":"7268_CR6","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i26\/80444","author":"STR Rajam","year":"2015","unstructured":"Rajam, S. T. R., & Kumar, S. B. R. (2015). Enhanced elliptic curve cryptography. Indian Journal of Science and Technology. https:\/\/doi.org\/10.17485\/ijst\/2015\/v8i26\/80444.","journal-title":"Indian Journal of Science and Technology"},{"issue":"9","key":"7268_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.5120\/ijca2018917688","volume":"182","author":"EK Boahen","year":"2018","unstructured":"Boahen, E. K., & Ben, J. (2018). An enhanced elliptic curve cryptosystem for securing data. International Journal of Computer Applications,182(9), 47\u201353. https:\/\/doi.org\/10.5120\/ijca2018917688.","journal-title":"International Journal of Computer Applications"},{"key":"7268_CR8","doi-asserted-by":"publisher","unstructured":"Keerthi, K., & Surendiran, B. (2017). Elliptic curve cryptography for secured text encryption. In International conference on circuits power and computing technologies [ICCPCT]\nhttps:\/\/doi.org\/10.1109\/iccpct.2017.8074210.","DOI":"10.1109\/iccpct.2017.8074210"},{"key":"7268_CR9","doi-asserted-by":"publisher","unstructured":"Herbaut, F., & V\u00e9ron, P. (2010). A public key cryptosystem based upon euclidean addition chains. In International conference on sequences and their applications (pp. 284\u2013297) https:\/\/doi.org\/10.1007\/978-3-642-15874-2_24.","DOI":"10.1007\/978-3-642-15874-2_24"},{"key":"7268_CR10","unstructured":"Proy, J., Veyrat-Charvillon, N., Tisserand, A., & M\u00e9loni, N. (2015). Full hardware implementation of short addition chains recoding for ECC scalar multiplication. In Compas\u20192015: Parall\u00e9lisme\/Architecture\/Syst\u00e8me Lille."},{"key":"7268_CR11","doi-asserted-by":"publisher","unstructured":"Picek, S., Coello, C. A. C., Jakobovic, D., & Mentens, N. (2016). Evolutionary algorithms for finding short addition chains: Going the distance. In Deconstructing the big valley search space hypothesis, at springer, Volume: Lecture notes in computer science 9595 (pp. 121\u2013137). https:\/\/doi.org\/10.1007\/978-3-319-30698-8_9.","DOI":"10.1007\/978-3-319-30698-8_9"},{"key":"7268_CR12","doi-asserted-by":"publisher","unstructured":"Leinweber, L., Papachristou, Ch., & Wolff, F. G. (2012). An efficient elliptic curve cryptography processor using addition chains with high information entrophy. In Canadian conference on electrical and computer engineering\nhttps:\/\/doi.org\/10.1109\/ccece.2012.6334841.","DOI":"10.1109\/ccece.2012.6334841"},{"key":"7268_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/862508","author":"H Liu","year":"2013","unstructured":"Liu, H., Zhou, Y., & Zhu, N. (2013). A novel elliptic curve scalar multiplication algorithm against power analysis. Mathematical Problems in Engineering. https:\/\/doi.org\/10.1155\/2013\/862508.","journal-title":"Mathematical Problems in Engineering"},{"key":"7268_CR14","doi-asserted-by":"publisher","unstructured":"Giorgi, P., Imbert, L., & Izard, T. (2009). Optimizing elliptic curve scalar multiplication for small scalars. In Proceedings of SPIE\u2014The international society for optical engineering (Vol. 7444) https:\/\/doi.org\/10.1117\/12.827689.","DOI":"10.1117\/12.827689"},{"key":"7268_CR15","doi-asserted-by":"publisher","unstructured":"Le, D.-P., & Tan, C. H. (2011). Improved precomputation scheme for scalar multiplication on elliptic curves. In IMA international conference on cryptography and coding (pp. 327\u2013343) https:\/\/doi.org\/10.1007\/978-3-642-25516-8_20.","DOI":"10.1007\/978-3-642-25516-8_20"},{"key":"7268_CR16","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.suscom.2018.06.003","volume":"19","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Gupta, B. B., & Ishibashi, Y. (2018). Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustainable Computing: Informatics and Systems,19, 174\u2013184. https:\/\/doi.org\/10.1016\/j.suscom.2018.06.003.","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"7268_CR17","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"AP Plageras","year":"2018","unstructured":"Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient sensor BIG data collection processing and analysis in smart buildings. Future Generation Computer Systems,82, 349\u2013357. https:\/\/doi.org\/10.1016\/j.future.2017.09.082.","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"7268_CR18","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B.-G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems,78(3), 964\u2013975. https:\/\/doi.org\/10.1016\/j.future.2016.11.031.","journal-title":"Future Generation Computer Systems"},{"issue":"7","key":"7268_CR19","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1109\/TVLSI.2019.2909754","volume":"27","author":"DB Roy","year":"2019","unstructured":"Roy, D. B., & Mukhopadhyay, D. (2019). High-speed implementation of ECC scalar multiplication in GF(p) for generic montgomery curves. IEEE Transactions on Very Large Scale Integration (VLSI) Systems,27(7), 1587\u20131600.","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"7268_CR20","doi-asserted-by":"publisher","first-page":"27336","DOI":"10.1109\/ACCESS.2018.2836350","volume":"6","author":"S Ding","year":"2018","unstructured":"Ding, S., Li, C., & Li, H. (2018). A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access,6, 27336\u201327345.","journal-title":"IEEE Access"},{"issue":"7","key":"7268_CR21","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1109\/TC.2018.2851238","volume":"68","author":"JW Bos","year":"2019","unstructured":"Bos, J. W., & Friedberger, S. J. (2019). Arithmetic considerations for isogeny-based cryptography. IEEE Transactions on Computers,68(7), 979\u2013990.","journal-title":"IEEE Transactions on Computers"},{"key":"7268_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.5815\/ijmsc.2017.02.04","volume":"2","author":"K Mani","year":"2017","unstructured":"Mani, K., & Viswambari, M. (2017). A new method of generating optimal addition chain based on graph. International Journal of Mathematical Sciences and Computing,2, 37\u201354. https:\/\/doi.org\/10.5815\/ijmsc.2017.02.04.","journal-title":"International Journal of Mathematical Sciences and Computing"},{"issue":"4","key":"7268_CR23","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1109\/TCSI.2018.2883557","volume":"66","author":"T Shahroodi","year":"2019","unstructured":"Shahroodi, T., Bayat-Sarmadi, S., & Mosanaei-Boorani, H. (2019). Low-latency double point multiplication architecture using differential addition chain over GF(2m). IEEE Transactions on Circuits and Systems I: Regular Papers,66(4), 1465\u20131473.","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"issue":"11","key":"7268_CR24","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1109\/TCSII.2017.2785382","volume":"65","author":"L Li","year":"2018","unstructured":"Li, L., & Li, S. (2018). High-performance pipelined architecture of point multiplication on Koblitz curves. IEEE Transactions on Circuits and Systems II: Express Briefs,65(11), 1723\u20131727.","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"issue":"3","key":"7268_CR25","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TC.2017.2750677","volume":"67","author":"E Guerrini","year":"2018","unstructured":"Guerrini, E., Imbert, L., & Winterhalter, T. (2018). Randomized mixed-radix scalar multiplication. IEEE Transactions on Computers,67(3), 418\u2013431.","journal-title":"IEEE Transactions on Computers"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07268-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07268-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07268-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T23:06:00Z","timestamp":1618009560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07268-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,10]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["7268"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07268-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,10]]},"assertion":[{"value":"10 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}