{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T16:07:55Z","timestamp":1746288475367},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_41","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:01:51Z","timestamp":1311609711000},"page":"397-406","source":"Crossref","is-referenced-by-count":4,"title":["Elliptic Curve Cryptography for Smart Phone OS"],"prefix":"10.1007","author":[{"given":"Sharmishta","family":"Desai","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Bedi","sequence":"additional","affiliation":[]},{"given":"B. N.","family":"Jagdale","sequence":"additional","affiliation":[]},{"given":"V. M.","family":"Wadhai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"41_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"41_CR3","volume-title":"Studying Software Implementations of Elliptic Curve Cryptography","author":"H. Yan","year":"2006","unstructured":"Yan, H., Zhijie Jerry, S.: Studying Software Implementations of Elliptic Curve Cryptography. IEEE, Los Alamitos (2006)"},{"key":"41_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/ICADVC.2009.5378025","volume-title":"Implementation of Text based Cryptosystem using Elliptic Curve Cryptography","author":"M. Vigila","year":"2009","unstructured":"Vigila, M., Muneeswaran\u2018s, K.: Implementation of Text based Cryptosystem using Elliptic Curve Cryptography. IEEE, Los Alamitos (2009)"},{"key":"41_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.99","volume-title":"Combine Elliptic Curve Cryptography with Digital Watermark for OWL Based Ontology Encryption","author":"H. Kong","year":"2009","unstructured":"Kong, H., Zeng, Z., Yan, L., Yang, J., Yao, S., Sheng, N.: Combine Elliptic Curve Cryptography with Digital Watermark for OWL Based Ontology Encryption. IEEE, Los Alamitos (2009)"},{"issue":"5","key":"41_CR6","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1049\/ip-com:20010511","volume":"148","author":"M. Aydos","year":"2001","unstructured":"Aydos, M., Yanik, T., Kog, C.K.: High-speed implementation of an ECC based wireless authentication protocol on an ARM microprocessor. lEEE Proc. Commun.\u00a0148(5), 273\u2013279 (2001)","journal-title":"lEEE Proc. Commun."},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Lauter, K.: The Advantages of Elliptic Cryptography for Wireless Security. IEEE Wireless Communications, 62\u201367 (February 2006)","DOI":"10.1109\/MWC.2004.1269719"},{"key":"41_CR8","volume-title":"Design of an Efficient Elliptic Curve Cryptography Coprocessor","author":"B. Muthukumar","year":"2009","unstructured":"Muthukumar, B., Jeevanantharr, S.: Design of an Efficient Elliptic Curve Cryptography Coprocessor. IEEE, Los Alamitos (2009)"},{"key":"41_CR9","volume-title":"Multithreading Elliptic Curve Cryptosystem","author":"U.S. Kanniah","year":"2007","unstructured":"Kanniah, U.S., Samsudin, A.: Multithreading Elliptic Curve Cryptosystem. IEEE, Los Alamitos (2007)"},{"key":"41_CR10","volume-title":"Concurrent Algorithm For High-speed Point Multiplication In Elliptic Curve Cryptography","author":"J.-H. Chen","year":"2005","unstructured":"Chen, J.-H., Shieh, M.-D., Wu, C.-M., Taiwan.: Concurrent Algorithm For High-speed Point Multiplication In Elliptic Curve Cryptography. IEEE, Los Alamitos (2005)"},{"key":"41_CR11","volume-title":"Software implementation of ECC over 8-bit processor","author":"H. Yan","year":"2006","unstructured":"Yan, H., Shi, Z.J.: Software implementation of ECC over 8-bit processor. IEEE, Los Alamitos (2006)"},{"key":"41_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.57","volume-title":"An Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography","author":"T. Ahmad","year":"2009","unstructured":"Ahmad, T., Hu, J., Han, S.: An Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography. IEEE, Los Alamitos (2009)"},{"issue":"7","key":"41_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5120\/1222-1773","volume":"8","author":"B.N. Jagdale","year":"2010","unstructured":"Jagdale, B.N., Bedi, R.K., Desai, S.: Securing MMS with High Performance Elliptic Curve Cryptography. International Journal of Computer Applications\u00a08(7), 17\u201320 (2010)","journal-title":"International Journal of Computer Applications"},{"key":"41_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2009.5172547","volume-title":"Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curve Cryptography","author":"S. Khajuria","year":"2009","unstructured":"Khajuria, S., Tange, H.: Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curve Cryptography. IEEE, Los Alamitos (2009)"},{"key":"41_CR15","unstructured":"www.pcworld.com"},{"key":"41_CR16","unstructured":"http:\/\/topnews.co.uk"},{"key":"41_CR17","unstructured":"www.certicom.com"},{"key":"41_CR18","volume-title":"Cryptography and Network Security","author":"W. Stallings","year":"2006","unstructured":"Stallings, W.: Cryptography and Network Security, 4th edn. Prentice Hall, Englewood Cliffs (2006)","edition":"4"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T09:15:48Z","timestamp":1560417348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}