{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T04:49:36Z","timestamp":1726030176394},"publisher-location":"Cham","reference-count":70,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030180744"},{"type":"electronic","value":"9783030180751"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-18075-1_3","type":"book-chapter","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T02:02:34Z","timestamp":1559181754000},"page":"39-60","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography"],"prefix":"10.1007","author":[{"given":"Matluba","family":"Khodjaeva","sequence":"first","affiliation":[]},{"given":"Muath","family":"Obaidat","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Salane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,31]]},"reference":[{"key":"3_CR1","unstructured":"Ericsson (2016) Ericsson Mobility Report, On the pulse of the networked society, Report, Jun 2016"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Kamble A, Malemath VS, Patil D (2017) Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: International conference on emerging trends & innovation in ICT (ICEI), Pune Institute of Computer Technology, Pune, India, Feb 3\u20135, 2017","DOI":"10.1109\/ETIICT.2017.7977006"},{"key":"3_CR3","unstructured":"Gartner Inc. (2015) Gartner Says 6.4 Billion Connected \u201cThings\u201d Will Be in Use in 2016, Up 30 Percent From 2015. \n                  http:\/\/www.gartner.com\/newsroom\/id\/3165317\n                  \n                , Nov. 2015. Accessed December 2018"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Karnouskos S, Marrn PJ, Fortino G, Mottola L, Martinez JR de Dios (2014) Applications and markets for cooperating objects. Springer Briefs in Electrical and Computer Engineering, Springer","DOI":"10.1007\/978-3-642-45401-1"},{"key":"3_CR5","unstructured":"Nokia (2016) A buyers and influencers guide to connected device management, for all things connected in mobile, home and IoT, Strategic Whitepaper, Jul 2016"},{"key":"3_CR6","unstructured":"Statista (2015) Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). \n                  https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\n                  \n                . Accessed Dec 2018"},{"key":"3_CR7","unstructured":"Dave E (2011) The Internet of Things: how the next evolution of the internet is changing everything, CISCO. Accessed Dec 2018. \n                  http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"key":"3_CR8","unstructured":"Press Release, Strategy Analytics (2014) M2M market will generate $242 billion revenue by 2022. \n                  https:\/\/www4.strategyanalytics.com\/default.aspx?mod=pressreleaseviewer&a0=5468\n                  \n                . Accessed on December 2018"},{"issue":"5","key":"3_CR9","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MMM.2013.2259398","volume":"14","author":"Sangkil Kim","year":"2013","unstructured":"Kim S, Mariotti C, Alimenti F, Mezzanotte P, Georgiadis A, Collado A, Roselli L, Tentzeris M (2013) No battery required: Perpetual RFID-enabled wireless sensors for cognitive intelligence applications. Microw Mag IEEE 14(5):66\u201377","journal-title":"IEEE Microwave Magazine"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Roselli L et al (2015) Review of the present technologies concurrently contributing to the implementation of the Internet of Things (IoT) paradigm: RFID, green electronics, WPT and energy harvesting. In: IEEE Topical conference on wireless sensors and sensor networks (WiSNet), San Diego, CA, pp 1\u20133","DOI":"10.1109\/WISNET.2015.7127402"},{"key":"3_CR11","unstructured":"IoT-A, (2014) Internet of Things \u2013 architecture Io-A deliverable D1.3 updated reference model for IoT v1.5. \n                  http:\/\/cocoa.ethz.ch\/downloads\/2014\/01\/1524_D1.3_Architectural_Reference_Model_update.pdf\n                  \n                . Accessed Dec 2018"},{"key":"3_CR12","unstructured":"Industrial internet consortium (2015) Industrial internet reference architecture v 1.8, \n                  https:\/\/www.iiconsortium.org\/IIRA.htm\n                  \n                . Accessed Dec 2018"},{"key":"3_CR13","unstructured":"ZVEI Die Elektroindutrie (2015) The reference architectural model RAMI 4.0 and the Industrie 4.0 component, \n                  https:\/\/www.zvei.org\/en\/subjects\/industry-4\u20130\/the-reference-architectural-model-rami-40-and-the-industrie-40-component\/\n                  \n                . Accessed Dec 2018"},{"key":"3_CR14","unstructured":"Cisco (2014) Building the Internet of Things. \n                  https:\/\/www.cisco.com\/c\/dam\/global\/en_ph\/assets\/ciscoconnect\/pdf\/bigdata\/jim_green_cisco_connect.pdf\n                  \n                . Accessed Dec 2018"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-20898-0_5","volume-title":"The Future Internet","author":"Alex Gluhak","year":"2011","unstructured":"Gluhak et al (2011) An architectural blueprint for a real-world internet. The Future Internet, Lecture Notes in Computer Science, vol 6656, pp 67\u201380"},{"key":"3_CR16","unstructured":"Chaqfeh MA, Mohamed N (2012) Challenges in middleware solutions for the Internet of Things. In: Proceedings of international conference CTS, pp 21\u201326"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: The Internet of Things architecture, possible applications and key challenges. In: Proceedings of 10th international conference FIT, pp 257\u2013260","DOI":"10.1109\/FIT.2012.53"},{"key":"3_CR18","unstructured":"Tan L, Wang N (2010) Future internet: The Internet of Things. In: Proceedings of 3rd ICACTE, 2010, V5, pp 376\u2013380"},{"issue":"4","key":"3_CR19","doi-asserted-by":"publisher","first-page":"561","DOI":"10.3745\/JIPS.2011.7.4.561","volume":"7","author":"Amit Grover","year":"2011","unstructured":"Grover A, Berghel H (2011) A survey of RFID deployment and security issues, Korea Science. J Informat Process Syst 7(4)","journal-title":"Journal of Information Processing Systems"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"Stephen A. Weis","year":"2004","unstructured":"Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of 1st international conference security pervasive computing, pp 201\u2013212"},{"key":"3_CR21","unstructured":"Wu M, Lu TJ, Ling FY, Sun J, Du HY (2010) Research on the architecture of Internet of Things. In: Proceedings of 3rd ICACTE, 2010, pp V5-484\u2013V5-487"},{"key":"3_CR22","unstructured":"Yang Z et al (2011) Study and application on the architecture and key technologies for IOT. In: Proceedings of ICMT, pp 747\u2013751"},{"issue":"5","key":"3_CR23","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s10796-009-9210-z","volume":"12","author":"Aikaterini Mitrokotsa","year":"2009","unstructured":"Mitrokotsa A, Rieback MR, Tanenbaum (2010) Classifying RFID attacks and defenses. A.S. Informat Syst Front 12(5):491\u2013505. \n                  https:\/\/doi.org\/10.1007\/s10796-009-9210-z","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"3_CR24","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"Mario Frustaci","year":"2018","unstructured":"Frustaci M, Pace P, Aloi G, Fortino G (2018) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet of Things J 5(4):2483\u20132495","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"3_CR25","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"Jie Lin","year":"2017","unstructured":"Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things J 4(5):1125\u20131142","journal-title":"IEEE Internet of Things Journal"},{"key":"3_CR26","unstructured":"Anderson R, Kuhn M (1996) Tamper resistance-a cautionary note. In: Second USENIX workshop on electronic commerce proceedings, Oakland, California, November 18\u201321, 1996, pp 1\u201311"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Zhao K, Ge L (2013) A Survey on the Internet of Things security. In: 2013 ninth international conference on computational intelligence and security, Leshan, pp 663\u2013667","DOI":"10.1109\/CIS.2013.145"},{"key":"3_CR28","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-44499-8_24","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"Steve H. Weingart","year":"2000","unstructured":"Weingart SH (2000) Physical security devices for computer subsystems: a survey of attacks and defenses. In: Ko\u00e7 \u00c7K, Paar C (eds) Cryptographic hardware and embedded systems- CHES 2000. CHES 2000. Lecture Notes in Computer Science, vol 1965. Springer, Berlin, Heidelberg"},{"issue":"4","key":"3_CR29","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"Arsalan Mosenia","year":"2017","unstructured":"Mosenia A, Jha NK (2017), A comprehensive study of security of Internet-of-Things. IEEE Trans Emerg Topics Comput 5(4):586\u2013602","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"3_CR30","unstructured":"C3 Public Wiki (2006) RFID-Zapper (EN). \n                  https:\/\/events.ccc.de\/congress\/2005\/static\/r\/f\/i\/RFID-Zapper(EN)_77f3.html\n                  \n                . Accessed Dec 2018"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2017)","DOI":"10.1109\/I-SMAC.2017.8058363"},{"key":"3_CR32","unstructured":"Kashif L, Shamsi JA (2015) A study of security issues, vulnerabilities and challenges in internet of things. Secur Cyber-Phys Syst 221"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Lan L (2012) Study on security architecture in the Internet of Things. In: Proceedings of 2012 international conference on measurement, information and control, Harbin, China, pp 374\u2013377","DOI":"10.1109\/MIC.2012.6273274"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered approach for attacks and defenses. In: International conference on communication technologies (ComTech), Rawalpindi, 2017, pp 104\u2013110","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"3_CR35","first-page":"180","volume":"2015","author":"C Chrysostomou Andrea","year":"2015","unstructured":"Andrea C Chrysostomou, Hadjichristofi G (2015) Internet of Things: Security vulnerabilities and challenges, IEEE Symposium on Computers and Communication (ISCC). Larnaca 2015:180\u2013187","journal-title":"Larnaca"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Syverson P (1994) A taxonomy of replay attacks [cryptographic protocols]. In: Proceedings the computer security foundations workshop VII, Franconia, NH, USA, pp 187\u2013191","DOI":"10.1109\/CSFW.1994.315935"},{"key":"3_CR37","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"Paul Kocher","year":"1999","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Wiener M (ed) Advances in cryptology CRYPTO\u2019 99. CRYPTO 1999. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg"},{"key":"3_CR38","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems","author":"Thomas S. Messerges","year":"1999","unstructured":"Messerges TS, Dabbish EA, Sloan RH (1999) Power analysis attacks of modular exponentiation in smartcards. In: Ko\u00e7 \u00c7K, Paar C (eds) Cryptographic hardware and embedded systems. CHES 1999. Lecture Notes in Computer Science, vol 1717. Springer, Berlin, Heidelberg"},{"key":"3_CR39","first-page":"35","volume":"2014","author":"W Atamli","year":"2014","unstructured":"Atamli W, Martin A (2014) Threat-based security analysis for the Internet of Things. International Workshop on Secure Internet of Things, Wroclaw 2014:35\u201343","journal-title":"International Workshop on Secure Internet of Things, Wroclaw"},{"issue":"3","key":"3_CR40","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCC.2016.63","volume":"3","author":"Deepak Puthal","year":"2016","unstructured":"Puthal D, Nepal S, Ranjan R, Chen J (2016) Threats to networking cloud and edge data centers in the Internet of Things. In: IEEE cloud computing, vol 3, no 3, pp 64\u201371","journal-title":"IEEE Cloud Computing"},{"key":"3_CR41","unstructured":"Sopori D, Pawar T, Patil M, Ravindran R (2017) Internet of things: security threats. Int J Advanc Res Comput Eng Technol (IJARCET), 6(3), ISSN 2278 \u2013 1323"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015) Internet of Things (IoT) security: current status, challenges and prospective measures. In: the 10th international conference for internet technology and secured transactions (ICITST-2015)","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Juels A, Rivest RL, Szydlo M (2003) The blocker tag: Selective blocking of RFID tags for consumer privacy. In: Proceedings of ACM 10th conference on computing and communication security, pp 103\u2013111","DOI":"10.1145\/948109.948126"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Kim DS, Shin TH, Park JS (2006) Access control and authorization for security of RFID multi-domain using SAML and XACML. In: International Conference on Computational Intelligence and Security, Guangzhou, pp 1587\u20131590","DOI":"10.1109\/ICCIAS.2006.295330"},{"issue":"4","key":"3_CR45","first-page":"2014","volume":"3","author":"R Uttarkar","year":"2014","unstructured":"Uttarkar R, Kulkarni R (2014) Internet of things: architecture and security. Int J Comput Appl 3(4):2014","journal-title":"Int J Comput Appl"},{"key":"3_CR46","unstructured":"Thakur BS, Chaudhary S (2013) Content sniffing attack detection in client and server side: a survey. Int J Advanc Comput Res (IJACR) 3"},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"Halim T, Islam Md. R, (2012) A study on the security issues in WSN. Int J Comput Appl (0975 \u2013 8887), 53(1)","DOI":"10.5120\/8386-1992"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Khoo B (2011) RFID as an enabler of the internet of things: issues of security and privacy. In: International conference on internet of things and 4th international conference on cyber, physical and social computing, Dalian, pp 709\u2013712","DOI":"10.1109\/iThings\/CPSCom.2011.83"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Pedro P, Julio H, Juan T, Li T, Li Y (2010) Vulnerability analysis of RFID protocols for tag ownership transfer. Comput Netw 54(9):1502\u20131508. Research Collection School of Information Systems","DOI":"10.1016\/j.comnet.2009.11.007"},{"key":"3_CR50","unstructured":"Rieback MR, Crispo B, Tanenbaum AS (2006) Is your cat infected with a computer virus? In: Fourth annual IEEE international conference on pervasive computing and communications (PERCOM\u201906), Pisa, pp 10\u2013179"},{"key":"3_CR51","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0065-2458(01)80019-X","volume":"54","author":"M Atallah","year":"2002","unstructured":"Atallah M, Pantazopoulos KN, Rice J, Spafford E (2002) Secure outsourcing of scientific computations. Adv Comput 54:215\u2013272","journal-title":"Adv Comput"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Hohenberger S, Lysyanskaya A (2005) How to securely outsource cryptographic computations. In: Proceedings of the theory of cryptography conference 2005. Springer, pp 264\u2013282","DOI":"10.1007\/978-3-540-30576-7_15"},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Benjamin D, Atallah M (2008) Private and cheating-free outsourcing of algebraic computations. In: Sixth annual conference on privacy, security and trust, PST 2008, Fredericton, New Brunswick, Canada, Springer, October 2008, pp 240\u2013245","DOI":"10.1109\/PST.2008.12"},{"key":"3_CR54","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: STOC \u201909, 2009, pp 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"3_CR55","unstructured":"Atallah M, Frikken K (2010) Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM symposium on information, computer and communications security. Springer, New York, 2010, pp 48\u201359"},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. Advanc Cryptol CRYPTO 2010, Lecture Notes Computer Science 6223, 465\u2013 482","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"3_CR57","doi-asserted-by":"crossref","unstructured":"Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, pp 160\u2013168. IEEE Computer Society","DOI":"10.1109\/SFCS.1982.38"},{"key":"3_CR58","unstructured":"Chung K, Kalaiand Y, Vadhan S (2010) Improved delegation of computation using fully homomorphic encryption. In: Proceedings of 30th annual cryptology conference, Santa Barbara, CA, USA, in: Lect. Notes Computer Science, vol 6223, Springer, August 2010, pp 483\u2013501"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Chung K, Kalaiand Y, Liu F (2011) Memory delegation. In: Proceedings of the 31st annual cryptology conference, Santa Barbara, CA, USA. Lecture Notes Computer Science, vol 6841, Springer, pp 151\u2013168","DOI":"10.1007\/978-3-642-22792-9_9"},{"key":"3_CR60","unstructured":"Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Proceedings of the 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, in: Lect. Notes Comput. Science, vol 7194, Springer, March 2012, pp 422\u2013439"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Di Crescenzo G, Khodjaeva M, Kahrobaei D, Shpilrain V (2017) Computing multiple exponentiations in discrete log and RSA groups: from batch verification to batch delegation. In: Proceedings of 3rd IEEE workshop on security and privacy in the cloud. IEEE","DOI":"10.1109\/CNS.2017.8228702"},{"key":"3_CR62","first-page":"236","volume-title":"Lecture Notes in Computer Science","author":"Mihir Bellare","year":"1998","unstructured":"Bellare M, Garay J, Rabin T (1998) Fast batch verification for modular exponentiation and digital signatures. Proc Eurocrypt, Springer, pp 236\u2013250"},{"key":"3_CR63","doi-asserted-by":"crossref","unstructured":"Wang Y, Wu Q, Wong D, Qin B, Chow S, Liu Z, Tao X (2014) Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceedings of computer security-ESORICS 2014. Springer, pp 326\u2013343","DOI":"10.1007\/978-3-319-11203-9_19"},{"issue":"1","key":"3_CR64","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10207-014-0236-y","volume":"14","author":"Alex Arbit","year":"2014","unstructured":"Arbit A, Livne Y, Oren Y, Wool A (2015) Implementing public-key cryptography on passive RFID tags is practical. Int J Inf Sec 14(1):85\u201399","journal-title":"International Journal of Information Security"},{"key":"3_CR65","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-642-33167-1_31","volume-title":"Computer Security \u2013 ESORICS 2012","author":"Xiaofeng Chen","year":"2012","unstructured":"Chen X, Li J, Ma\u00a0J, Tang Q, Lou W (2012) New algorithms for secure outsourcing of modular exponentiations. In: Computer security\u2013ESORICS 2012, pp 541\u2013556"},{"key":"3_CR66","doi-asserted-by":"crossref","unstructured":"Ye J, Chen X, Ma\u00a0J (2015) An improved algorithm for secure outsourcing of modular exponentiations. In: Proceedings of 29th international conference on advanced information networking and applications, March 2015, pp 73\u201376","DOI":"10.1109\/WAINA.2015.34"},{"key":"3_CR67","doi-asserted-by":"crossref","unstructured":"Ding Y, Xu Z, Ye J, Choo K (2017) Secure outsourcing of modular exponentiations under single untrusted programme model. J Comput Syst Sci 90, C Academic Press, Inc., 1\u201313","DOI":"10.1016\/j.jcss.2016.11.005"},{"key":"3_CR68","doi-asserted-by":"crossref","unstructured":"Cavallo B, Di Crescenzo G, Kahrobaei D, Shpilrain V (2015) Efficient and secure delegation of group exponentiation to a single server. In: International workshop on radio frequency identification: security and privacy issues. Springer, pp 156\u2013173","DOI":"10.1007\/978-3-319-24837-0_10"},{"key":"3_CR69","doi-asserted-by":"crossref","unstructured":"Di Crescenzo G, Khodjaeva M, Kahrobaei D, Shpilrain V (2018) Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups.Springer Lecture Notes in Computer Science","DOI":"10.1007\/978-3-319-96418-8_17"},{"key":"3_CR70","doi-asserted-by":"crossref","unstructured":"Di Crescenzo G, Khodjaeva M, Kahrobaei D, Shpilrain V (2017) Practical and secure outsourcing of discrete log group exponentiation to a single malicious server. In: Proceedings of 9th ACM cloud computing security workshop (CCSW), pp 17\u201328","DOI":"10.1145\/3140649.3140657"}],"container-title":["Security, Privacy and Trust in the IoT Environment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-18075-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T02:06:31Z","timestamp":1559181991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-18075-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030180744","9783030180751"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-18075-1_3","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"31 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}