{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:25:13Z","timestamp":1743085513477,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_46","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"508-517","source":"Crossref","is-referenced-by-count":0,"title":["Energy Efficient Encryption Scheme for Network-Coded Mobile Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Deepa S.","family":"Nair","sequence":"first","affiliation":[]},{"given":"H.","family":"Muhammed Ilyas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"issue":"9","key":"46_CR1","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1109\/TPDS.2013.161","volume":"25","author":"P Zhang","year":"2014","unstructured":"Zhang, P., Lin, C., Jiang, Y., Fan, Y., Shen, X(.S).: A lightweight encryption scheme for network-coded mobile Ad Hoc networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 2211\u20132221 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"8","key":"46_CR2","first-page":"472","volume":"2","author":"R Chehal","year":"2012","unstructured":"Chehal, R., Singh, K., Singh, K.: Efficiency and security of data with symmetric encryption algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(8), 472\u2013475 (2012)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"issue":"2","key":"46_CR3","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TMC.2006.16","volume":"5","author":"NR Potlapally","year":"2006","unstructured":"Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mob. Comput. 5(2), 128\u2013143 (2006)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"46_CR4","unstructured":"Suhashini1, C., Sivakumar, S.: A secure approach with physical layer encryption in MANET. In: International Conference on Engineering Technology and Science (ICETS 2014), pp. 177\u2013181, February 2014"},{"key":"46_CR5","unstructured":"Kumar, G., Saha, R., Kumar Rai, M.: DSAB A hybrid approach for providing security in MANET. Int. J. Inf. Secur. Sci., 82\u201387, July 2012"},{"key":"46_CR6","unstructured":"Komninos, N., Soroush, H., Salajegheh, M.: Algorithms & security group athens information technology. LEE: Light-Weight Energy-Efficient Encryption Algorithm for Sensor Networks, 1\u20136, January 2009"},{"key":"46_CR7","unstructured":"Ranaut, D., Lal, M.: A review on security issues and encryption algorithms in Mobile Ad-hoc Network. Int. J. Sci. Res. (IJSR), 146\u2013148, March 2012"},{"key":"46_CR8","unstructured":"Kumar, A., Tyagi, S.S., Rana, M., Aggarwal, N., Bhadana, P.: A comparative study of public key cryptosystem based on ECC and RSA. Int. J. Comput. Sci. Eng. (IJCSE), 1904\u20131909, May 2011"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Kofahi, N.A.: Yarmouk University Irbid, Jordan: \u201cAn empirical study to compare the performance of some symmetric and asymmetric ciphers\". Int. J. Secur. Appl., 1\u201315 (2013)","DOI":"10.14257\/ijsia.2013.7.5.01"},{"issue":"5","key":"46_CR10","first-page":"1904","volume":"2","author":"B Padma","year":"2010","unstructured":"Padma, B., Chandravathi, D., Prapoorna Roja, P.: Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitzs Method. Int. J. Comput. Sci. Eng. 2(5), 1904\u20131907 (2010)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"46_CR11","unstructured":"Anoop, M.S.: Elliptic Curve Cryptography An Implementation Guide, pp. 1\u201311"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:43:02Z","timestamp":1559302982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}