{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:48:46Z","timestamp":1749196126211,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811556784"},{"type":"electronic","value":"9789811556791"}],"license":[{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T00:00:00Z","timestamp":1598745600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5679-1_20","type":"book-chapter","created":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:05:18Z","timestamp":1598688318000},"page":"207-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment"],"prefix":"10.1007","author":[{"given":"Ambili","family":"Thomas","sequence":"first","affiliation":[]},{"given":"V. Lakshmi","family":"Narasimhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,30]]},"reference":[{"key":"20_CR1","unstructured":"Kaliisa, R., Picard, M.: A systematic review on mobile learning in higher education: the African perspective. Turkish Online J. Educat. Technol. 16(1) (2017)"},{"key":"20_CR2","unstructured":"Telecommunication Union, Measuring the Information Society Report Executive summary 2018, Switzerland, Geneva, ITU Publications (2018)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Callou, G., Maciel, P., Tavares, E., Andrade, E., Nogueira, B., Araujo, C., Cunha, P.: Energy consumption and execution time estimation of embedded system applications. Microproc. Microsyst. 35 426\u2013440 (2011) (2010), Elsevier","DOI":"10.1016\/j.micpro.2010.08.006"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Toldinas, J., Damasevicius, R., Venckauskas, A., Blazauskas, T., Ceponis, J.: Energy consumption of cryptographic algorithms in mobile devices. ELEKTRONIKA IR ELEKTROTECHNIKA 20(5) (2014). ISSN 1392\u20131215","DOI":"10.5755\/j01.eee.20.5.7118"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Montoya, A.O., Munoz, M.A., Kofuji, S.T.: Performance analysis of encryption algorithms on mobile devices. In: 47th International Carnahan Conference on Security Technology. IEEE, Colombia (2013)","DOI":"10.1109\/CCST.2013.6922058"},{"key":"20_CR6","unstructured":"Lu, C., Tseng, S.: Integrated design of AES encrypter and decrypter. In: Proceedings IEEE International Conference on Application Specific Systems, Architectures, and Processors, USA (2002)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: International Conference on Circuits, Power and Computing Technologies. IEEE, India (2013)","DOI":"10.1109\/ICCPCT.2013.6528957"},{"issue":"3","key":"20_CR8","first-page":"1793","volume":"1","author":"DSA Elminaam","year":"2009","unstructured":"Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Tradeoffs between energy consumption and security of symmetric encryption algorithms. Int. J. Comput. Theory Eng. 1(3), 1793\u20138201 (2009)","journal-title":"Int. J. Comput. Theory Eng."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Javed, A., Shahid, M.A., Sharif, M., Yasmin, M.: Energy consumption in mobile phones, I. J. Comput. Netw. Informat. Secur. 12, 18\u201328. Modern Education and Computer Science Press","DOI":"10.5815\/ijcnis.2017.12.03"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Dolezal, J., Becvar, Z.: Methodology and tool for energy consumption modeling of mobile devices. In: IEEE Wireless Communications and Networking Conference Workshops, April 2014","DOI":"10.1109\/WCNCW.2014.6934857"},{"key":"20_CR11","unstructured":"Marsiglio, J.: Piecewise linear approximation. \nhttps:\/\/optimization.mccormick.northwestern.edu\/index.php\/Piecewise_linear_approximation\n\n. Last accessed 13 Apr 2019"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Fallah, S.A., Arioua, M., Oualkadi, A.E., Asri, J.E.: On the performance of piecewise linear approximation techniques in WSNs. International Conference on Advanced Communication Technologies and Networking, Marrakech (2018)","DOI":"10.1109\/COMMNET.2018.8360262"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Umaparvathi, M., Varughese, D.K.: Evaluation of symmetric encryption algorithms for MANETs. In: International Conference on Computational Intelligence and Computing Research. IEEE, India (2010)","DOI":"10.1109\/ICCIC.2010.5705754"},{"key":"20_CR14","unstructured":"Stewart, D.B.: Measuring execution time and real-time performance. In: Embedded Systems Conference, Boston (2006)"},{"key":"20_CR15","unstructured":"Pereira, R., Couto, M., Ribeiro, F., Cunha, J., Fernandes, J.P., Saraiva, J.: Energy efficiency across programming languages. In: Proceedings of Software Language Engineering, 12 pp. ACM, Canada (2017)"},{"key":"20_CR16","unstructured":"Kaufmann, J.: Reply to \u201cWhat do you consider a good standard deviation?\u201d. \nhttps:\/\/www.researchgate.net\/post\/What_do_you_consider_a_good_standard_deviation\n\n. Last accessed 25 Apr 2019"},{"key":"20_CR17","unstructured":"Martin, K.G.: Assessing the fit of regression models. \nhttps:\/\/www.theanalysisfactor.com\/assessing-the-fit-of-regression-models\/\n\n. Last accessed 23 Apr 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5679-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T08:09:23Z","timestamp":1598688563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5679-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,30]]},"ISBN":["9789811556784","9789811556791"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5679-1_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,30]]},"assertion":[{"value":"30 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}