{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:16:58Z","timestamp":1725556618641},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642131356"},{"type":"electronic","value":"9783642131363"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13136-3_5","type":"book-chapter","created":{"date-parts":[[2010,5,25]],"date-time":"2010-05-25T22:20:16Z","timestamp":1274826016000},"page":"42-51","source":"Crossref","is-referenced-by-count":0,"title":["Ensuring Confidentiality and Integrity of Multimedia Data on Multi-core Platforms"],"prefix":"10.1007","author":[{"given":"Eunji","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sungju","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yongwha","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Hyeonjoong","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Sung Bum","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"The MPEG Handbook","author":"J. Watkinson","year":"2004","unstructured":"Watkinson, J.: The MPEG Handbook. Elsevier, Amsterdam (2004)"},{"key":"5_CR2","volume-title":"Multimedia Security Handbook","author":"B. Furth","year":"2005","unstructured":"Furth, B., Kirovshi, D.: Multimedia Security Handbook. CRC Press, Boca Raton (2005)"},{"issue":"7","key":"5_CR3","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1016\/S0167-8191(02)00100-X","volume":"28","author":"I. Ahmad","year":"2002","unstructured":"Ahmad, I., He, Y., Liou, M.: Video Compression with Parallel Processing. Parallel Computing\u00a028(7), 1039\u20131078 (2002)","journal-title":"Parallel Computing"},{"key":"5_CR4","volume-title":"Computer Architecture","author":"J. Hennessy","year":"2007","unstructured":"Hennessy, J., Patterson, D.: Computer Architecture. Elsevier, Amsterdam (2007)"},{"key":"5_CR5","unstructured":"Akhter, S., Roberts, J.: Multi-Core Programming - Increasing Performance through Software Multi-Threading. Intel Press (2006)"},{"issue":"4","key":"5_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.4218\/etrij.00.0100.0402","volume":"22","author":"K. Park","year":"2000","unstructured":"Park, K., et al.: On-Chip Multiprocessor with Simultaneous Multithreading. ETRI Journal\u00a022(4), 13\u201324 (2000)","journal-title":"ETRI Journal"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: Advanced Encryption Standard (AES) (November 26, 2001)","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"5_CR8","unstructured":"NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation - Methods and Techniques, U.S. DoC\/NIST (2001)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/3-540-36492-7_7","volume-title":"Selected Areas in Cryptography","author":"J. Jonsson","year":"2003","unstructured":"Jonsson, J.: On the Security of CTR+CBC-MAC. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 76\u201393. Springer, Heidelberg (2003)"},{"key":"5_CR10","unstructured":"Dworkin, N.: Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800-38C (2002)"},{"key":"5_CR11","unstructured":"AMD (2009), http:\/\/multicore.amd.com\/Products\/"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13136-3_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:02:04Z","timestamp":1606186924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13136-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642131356","9783642131363"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13136-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}