{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T09:08:33Z","timestamp":1696496913187},"reference-count":11,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2012,9,1]],"date-time":"2012-09-01T00:00:00Z","timestamp":1346457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1016\/j.cose.2012.06.004","type":"journal-article","created":{"date-parts":[[2012,6,23]],"date-time":"2012-06-23T03:19:16Z","timestamp":1340421556000},"page":"771-781","source":"Crossref","is-referenced-by-count":19,"title":["Engineering a secure mobile messaging framework"],"prefix":"10.1016","volume":"31","author":[{"given":"Aniello","family":"Castiglione","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Cattaneo","sequence":"additional","affiliation":[]},{"given":"Maurizio","family":"Cembalo","sequence":"additional","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Pompeo","family":"Faruolo","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Petagna","sequence":"additional","affiliation":[]},{"given":"Umberto","family":"Ferraro Petrillo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2012.06.004_bib1","series-title":"CT-RSA","first-page":"250","article-title":"Software implementation of the nist elliptic curves over prime fields","author":"Brown","year":"2001"},{"key":"10.1016\/j.cose.2012.06.004_bib2","series-title":"Proceedings of the 2010 international conference on complex, intelligent and software intensive systems. CISIS '10","first-page":"843","article-title":"An extensible framework for efficient secure sms","author":"Castiglione","year":"2010"},{"key":"10.1016\/j.cose.2012.06.004_bib3","series-title":"Standards for efficient cryptography \u2013 SEC 1: elliptic curve cryptography","author":"Certicom Research","year":"2010"},{"key":"10.1016\/j.cose.2012.06.004_bib4","series-title":"Standards for efficient cryptography \u2013 SEC 2: recommended elliptic curve domain parameters","author":"Certicom Research","year":"2010"},{"key":"10.1016\/j.cose.2012.06.004_bib5","series-title":"Guide to elliptic curve cryptography","author":"Hankerson","year":"2003"},{"issue":"1","key":"10.1016\/j.cose.2012.06.004_bib6","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The Elliptic Curve Digital Signature Algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"International Journal of Information Security"},{"key":"10.1016\/j.cose.2012.06.004_bib7","series-title":"DEXA","first-page":"894","article-title":"Analysis of the power consumption of secure communication in wireless networks","author":"Kim","year":"2006"},{"issue":"2","key":"10.1016\/j.cose.2012.06.004_bib8","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TMC.2006.16","article-title":"A study of the energy consumption characteristics of cryptographic algorithms and security protocols","volume":"5","author":"Potlapally","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10.1016\/j.cose.2012.06.004_bib9","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.cose.2012.06.004_bib10","series-title":"Bouncy castle crypto API","author":"The Legion of Bouncy Castle","year":"2010"},{"key":"10.1016\/j.cose.2012.06.004_bib11","series-title":"Proceedings of the third IEEE international conference on pervasive computing and communications","first-page":"324","article-title":"Energy analysis\u00a0of public-key cryptography for wireless sensor networks","author":"Wander","year":"2005"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740481200096X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740481200096X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T15:54:01Z","timestamp":1542902041000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016740481200096X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":11,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["S016740481200096X"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2012.06.004","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2012,9]]}}}