{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:40:09Z","timestamp":1740181209631,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141706"},{"type":"electronic","value":"9783642141713"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14171-3_2","type":"book-chapter","created":{"date-parts":[[2010,6,12]],"date-time":"2010-06-12T11:34:46Z","timestamp":1276342486000},"page":"13-22","source":"Crossref","is-referenced-by-count":0,"title":["The Efficiency of RSA Encrypted Video Calls on Mobile Internet Devices"],"prefix":"10.1007","author":[{"given":"Mert","family":"Civriz","sequence":"first","affiliation":[]},{"given":"Derya","family":"Birant","sequence":"additional","affiliation":[]},{"given":"Alp","family":"Kut","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Multivariate Public Key Cryptosystems (Advances in Information Security)","author":"J. Ding","year":"2006","unstructured":"Ding, J., Gower, J.E., Schmidt, D.: Multivariate Public Key Cryptosystems (Advances in Information Security). Springer, New York (2006)"},{"key":"2_CR2","unstructured":"Miller, F.P., Vandome, A.F., McBrewster, J.: Public-key Cryptography. Alphascript Publishing (2009)"},{"key":"2_CR3","doi-asserted-by":"crossref","DOI":"10.1201\/9781420035247","volume-title":"RSA and Public-Key Cryptography","author":"R.A. Mollin","year":"2002","unstructured":"Mollin, R.A.: RSA and Public-Key Cryptography. Chapman & Hall, Boca Raton (2002)"},{"issue":"6","key":"2_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. Info. Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Info. Theory"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Lehane, B., Doyle, L., O\u2019Mahony, D.: Shared RSA Key Generation in a Mobile Ad Hoc Network. In: Proceedings of IEEE Military Communications Conference, vol.\u00a02, pp. 814\u2013819 (2003)","DOI":"10.1109\/MILCOM.2003.1290217"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-45811-5_11","volume-title":"Information Security","author":"F. Zhu","year":"2002","unstructured":"Zhu, F., Wong, D.S., Chan, A.H., Ye, R.: Password Authenticated Key Exchange based on RSA for Imbalanced Wireless Network. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 150\u2013161. Springer, Heidelberg (2002)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-540-39425-9_30","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"D.S. Wong","year":"2003","unstructured":"Wong, D.S., Chan, A.H., Zhu, F.: More Efficient Password Authenticated Key Exchange Based on RSA. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 241\u2013264. Springer, Heidelberg (2003)"},{"key":"2_CR8","unstructured":"Wu, M., Garfinkel, S., Miller, R.: Secure Web Authentication with Mobile Phones. In: DIMACS Workshop on Usable Privacy and Security Systems (2004)"},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11277-006-9174-y","volume":"42","author":"R.J. Hwang","year":"2007","unstructured":"Hwang, R.J., Su, F.-F., Huang, L.-S.: Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices. Wireless Personal Communications\u00a042(2), 213\u2013223 (2007)","journal-title":"Wireless Personal Communications"},{"key":"2_CR10","unstructured":"Balderas, T., Cumplido, R.: An Efficient Hardware Implementation of the KASUMI Block Cipher for Third Generation Cellular Networks. In: Proceedings of the global signal processing conference, GSPx 2004, Santa Clara, CA (2004)"},{"issue":"2","key":"2_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"2_CR12","volume-title":"Prime Numbers: A computational Perspective","author":"R. Crandall","year":"2005","unstructured":"Crandall, R., Pomerance, C.: Prime Numbers: A computational Perspective, 2nd edn., ch.\u00a05. Springer, Heidelberg (2005)","edition":"2"},{"key":"2_CR13","volume-title":"The RSA Cryptosystem","author":"C. Paar","year":"2010","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography. In: The RSA Cryptosystem, ch.\u00a07. Springer, Heidelberg (2010)"},{"key":"2_CR14","volume-title":"TCP \/IP Sockets in C#","author":"D.B. Makofske","year":"2004","unstructured":"Makofske, D.B., Donahoo, M.J., Calvert, K.L.: TCP \/IP Sockets in C#. Morgan Kaufmann, San Francisco (2004)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14171-3_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:06:31Z","timestamp":1740179191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14171-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141706","9783642141713"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14171-3_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}