{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:47:48Z","timestamp":1757778468459,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540200741"},{"type":"electronic","value":"9783540397625"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39762-5_42","type":"book-chapter","created":{"date-parts":[[2010,7,22]],"date-time":"2010-07-22T23:08:02Z","timestamp":1279840082000},"page":"358-368","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Ramesh","family":"Karri","sequence":"first","affiliation":[]},{"given":"Piyush","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"42_CR1","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1023\/A:1022241315935","volume":"8","author":"R. Karri","year":"2003","unstructured":"Karri, R., Mishra, P.: Optimizing the energy consumed by secure wireless session -Wireless Transport Layer Security case study. Journal of Mobile Networks and Applications\u00a08(2), 177\u2013185 (2003)","journal-title":"Journal of Mobile Networks and Applications"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Woesner, H., Ebert, J.P., Schlager, M., Wolisz, A.: Power saving mechanisms in emerging standards for wireless LANs: The MAC-level perspective. IEEE Personal Communication Systems, 40\u201348 (1998)","DOI":"10.1109\/98.683738"},{"key":"42_CR3","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/JCN.2000.6596709","volume":"2","author":"J. Ebert","year":"2000","unstructured":"Ebert, J., Stremmel, B., Wiederhold, E., Wolisz, A.: An energy-efficient power control approach for WLANs. Journal of Communications and Networks\u00a02, 197\u2013206 (2000)","journal-title":"Journal of Communications and Networks"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Rulnick, J.M., Bambos, N.: Mobile power management for maximum battery life in wireless communications network. In: Proceedings, IEEE ICC, March 1996, vol.\u00a02, pp. 443\u2013450 (1996)","DOI":"10.1109\/INFCOM.1996.493310"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Kravets, R., Krishnan, P.: Power management techniques for mobile communication. In: Proceedings, ACM\/IEEE MOBICOM (August 1999)","DOI":"10.1145\/288235.288276"},{"key":"42_CR6","volume-title":"Advances in Wireless Communications","author":"C. Rohl","year":"1998","unstructured":"Rohl, C., Woesner, H., Wolisz, A.: A short look on power saving mechanisms in the wireless LAN standard draft IEEE 802.11. In: Advances in Wireless Communications. Kluwer Academic Publishers, Dordrecht (1998)"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Singh, S., Raghavendra, C.S.: PAMAS-Power Aware Multi-Access Protocol with signaling for ad-hoc networks. Computer Communications Review (July 1998)","DOI":"10.1145\/293927.293928"},{"key":"42_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/98.637380","volume":"4","author":"M. Zorzi","year":"1997","unstructured":"Zorzi, M., Rao, R.R.: Energy constrained error control for wireless channels. IEEE Personal Communications\u00a04, 27\u201333 (1997)","journal-title":"IEEE Personal Communications"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Lettieri, P., Fragouli, C., Srivastava, M.B.: Low power error control for wireless links. In: Proceedings, ACM\/IEEE MOBICOM, August 1997, pp. 139\u2013150 (1997)","DOI":"10.1145\/262116.262142"},{"key":"42_CR10","unstructured":"IP Security protocol (IPSec), http:\/\/www.ietf.org\/html.charters\/ipsec-charter.html"},{"key":"42_CR11","unstructured":"Wireless Transport Layer Security Specification, http:\/\/www.wapforum.org"},{"key":"42_CR12","unstructured":"The Internet Key Exchange Protocol, http:\/\/www.ietf.org\/rfc\/rfc2409.txt"},{"issue":"6","key":"42_CR13","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"42_CR14","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1147\/sj.403.0721","volume":"40","author":"P.C. Cheng","year":"2001","unstructured":"Cheng, P.C.: An architecture for the Internet Key Exchange Protocol. IBM Systems Journal\u00a040(3), 721\u2013746 (2001)","journal-title":"IBM Systems Journal"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Karri, R., Mishra, P.: Modeling energy efficient secure wireless networks using network simulation. In: Proceedings, IEEE ICC, May 2003, vol.\u00a01, pp. 61\u201365 (2003)","DOI":"10.1109\/ICC.2003.1204143"},{"key":"42_CR16","unstructured":"DEFLATE Compressed Data Format Specification version 1.3, http:\/\/www.kblabs.com\/lab\/lib\/rfcs"},{"key":"42_CR17","volume-title":"Text compression","author":"T.C. Bell","year":"1990","unstructured":"Bell, T.C.: Text compression. Prentice Hall, Englewood Cliffs (1990)"},{"issue":"2","key":"42_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39762-5_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T07:34:45Z","timestamp":1740296085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39762-5_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540200741","9783540397625"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39762-5_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}