{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:20:02Z","timestamp":1737436802216,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_50","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T19:15:06Z","timestamp":1188328506000},"page":"540-548","source":"Crossref","is-referenced-by-count":0,"title":["Using Adaptative Encryption for Ubiquitous Environments"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Izquierdo","sequence":"first","affiliation":[]},{"given":"Joaquin","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Sierra","sequence":"additional","affiliation":[]},{"given":"Mildrey","family":"Carbonell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Argyroudis, P., Verma, R., Tewari, H., OM\u0301ahony, D.: Performance Analysis of Cryptographic Protocols on Handheld Devices. In: Proceedings of the Network Computing and Applications, pp. 169\u2013174 (2004)","DOI":"10.1109\/NCA.2004.1347774"},{"key":"50_CR2","unstructured":"Bauer, M.: Designing and Using DMZ Networks to Protect Internet Servers. Linux Journal\u00a017(83) (2001), http:\/\/www.linuxjournal.com\/article\/4415"},{"key":"50_CR3","volume-title":"Firewalls and Internet Security: Repelling the Wily Hacker","author":"W. Cheswick","year":"2003","unstructured":"Cheswick, W., Bellovin, S., Rubin, A.: Firewalls and Internet Security: Repelling the Wily Hacker, 2nd edn. Addison-Wesley, Reading (2003)","edition":"2"},{"issue":"1","key":"50_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S0167-4048(00)86356-7","volume":"19","author":"B. Hancock","year":"2000","unstructured":"Hancock, B.: Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Computers & Security\u00a019(1), 6\u20137 (2000)","journal-title":"Computers & Security"},{"issue":"15","key":"50_CR5","doi-asserted-by":"publisher","first-page":"2750","DOI":"10.1016\/j.comcom.2005.10.026","volume":"29","author":"A. Izquierdo","year":"2006","unstructured":"Izquierdo, A., Sierra, J.M., Torres, J.: On the implementation of security policies with adaptative encryption. Computer Communications\u00a029(15), 2750\u20132758 (2006)","journal-title":"Computer Communications"},{"key":"50_CR6","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1996)"},{"issue":"11","key":"50_CR7","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/188280.188294","volume":"37","author":"R. Needham","year":"1994","unstructured":"Needham, R.: Denial of Service: An Example. Communications of the ACM archive\u00a037(11), 42\u201346 (1994)","journal-title":"Communications of the ACM archive"},{"issue":"3","key":"50_CR8","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P. Rogaway","year":"2003","unstructured":"Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information Systems Security\u00a06(3), 365\u2013403 (2003)","journal-title":"ACM Transactions on Information Systems Security"},{"key":"50_CR9","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. J. Wiley & Sons, Chichester (1995)","edition":"2"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Stajano, F.: The Resurrecting Duckling - What Next? In: Proceedings of the 8th International Workshop on Security Protocols, pp. 204\u2013214 (2003)","DOI":"10.1007\/3-540-44810-1_27"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Stajano, F.: The security challenges of ubiquitous computing. In: Proceedings of the 5th Cryptographic Hardware and Embedded Systems Conference (CHES), vol.\u00a01 (2003)","DOI":"10.1007\/978-3-540-45238-6_1"},{"key":"50_CR12","doi-asserted-by":"crossref","unstructured":"Wong, D., Fuentes, H., Chan, A.: The Performance Measurement of Cryptographic Primitives on Palm Devices. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC), pp. 92\u2013101 (2001)","DOI":"10.1109\/ACSAC.2001.991525"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:19:11Z","timestamp":1737397151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_50","relation":{},"subject":[]}}