{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:07:24Z","timestamp":1725566844289},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540234234"},{"type":"electronic","value":"9783540301783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30178-3_26","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T15:55:07Z","timestamp":1285257307000},"page":"275-284","source":"Crossref","is-referenced-by-count":1,"title":["PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices"],"prefix":"10.1007","author":[{"given":"Bringel","family":"Filho","sequence":"first","affiliation":[]},{"given":"Windson","family":"Viana","sequence":"additional","affiliation":[]},{"given":"Rossana","family":"Andrade","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9 Jalles","family":"Monteiro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"Winkle, W.V.: Palm Business Applications. In: The Ultimate guide to mobile computing: 2002 mobile Technology, pp. 82\u201389 (2002)"},{"key":"26_CR2","unstructured":"Stallings, W.: Network security essentials: applications and standards \/ William Stallings ISBN: 0-13-016093-8"},{"key":"26_CR3","unstructured":"The Legion of Bouncy Castle. Cryptography API for Java, Available at \n                    \n                      http:\/\/www.bouncycastle.org\n                    \n                    \n                   (Last access in: February 2003)"},{"key":"26_CR4","unstructured":"Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography (October 1996)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Susilo, W.: Securing Handheld devices. In: 10th IEEE International Conference, Wollongong, pp. 349\u2013354 (2002)","DOI":"10.1109\/ICON.2002.1033336"},{"key":"26_CR6","unstructured":"Wong, D.S., Fuentes, H.H., Chan, A.H.: The Performance Measurement of Cryptographic Primitives on Palm Devices, Boston, pp. 1\u201310 (2002)"},{"key":"26_CR7","unstructured":"Java 2 Platform, Micro Edition (J2ME), Available at \n                    \n                      http:\/\/java.sun.com\/j2me\n                    \n                    \n                   (Last access in: March 10, 2003)"},{"key":"26_CR8","unstructured":"Argyroudis, P.G., Verma, R., Tewari, H., O\u2019Mayony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices (2003)"},{"key":"26_CR9","unstructured":"Windows CE, Dispon\u00edvel em, \n                    \n                      http:\/\/www.microsoft.com\/windowsce\/\n                    \n                    \n                   (Last access in: January 10, 2004)"},{"key":"26_CR10","unstructured":"Superwaba: The Java VM for PDAs, Available at \n                    \n                      http:\/\/www.superwaba.com.br\n                    \n                    \n                   (Last access in: March 10, 2003)"},{"key":"26_CR11","unstructured":"Microsoft. Mobile ASP.NET Web Applications, Available at \n                    \n                      http:\/\/www.asp.net\/default.aspx?tabIndex=6&tabId=44\n                    \n                    \n                   (Last access in: March 10, 2003)"},{"key":"26_CR12","unstructured":"Qualcomm. Qualcomm Brew, Available at \n                    \n                      http:\/\/www.qualcomm.com\/brew\/\n                    \n                    \n                   (Last access in: March 15, 2003)"},{"key":"26_CR13","unstructured":"PalmOne, Available at \n                    \n                      http:\/\/www.palm.com\/\n                    \n                    \n                   (Last access in: March 15, 2003)"},{"key":"26_CR14","unstructured":"SonyEricsson, Available at: \n                    \n                      http:\/\/developer.sonyericsson.com\/site\/global\/home\/p_home.jsp\n                    \n                    \n                   (Last access in: March 10, 2003)"}],"container-title":["Lecture Notes in Computer Science","Mobility Aware Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30178-3_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:52:49Z","timestamp":1619999569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30178-3_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540234234","9783540301783"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30178-3_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}