{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:27:45Z","timestamp":1755998865563},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2018,1,3]],"date-time":"2018-01-03T00:00:00Z","timestamp":1514937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10586-017-1542-8","type":"journal-article","created":{"date-parts":[[2018,1,3]],"date-time":"2018-01-03T08:49:07Z","timestamp":1514969347000},"page":"12021-12028","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments"],"prefix":"10.1007","volume":"22","author":[{"given":"K. Sathish","family":"Kumar","sequence":"first","affiliation":[]},{"given":"R.","family":"Sukumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,3]]},"reference":[{"key":"1542_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.knosys.2017.02.034","volume":"124","author":"G Li","year":"2017","unstructured":"Li, G., Zhang, Z., Wang, L., Chen, Q., Pan, J.: One-class collaborative filtering based on rating prediction and ranking prediction. Knowl. Based Syst. 124, 46\u201354 (2017)","journal-title":"Knowl. Based Syst."},{"key":"1542_CR2","unstructured":"Gao, X.-Z., Perumal, V.: Comparative analysis of elliptic curve cryptosystem and its survey. J. Chem. Pharm. Sci. 10(1), 414\u2013419. ISSN: 0974-2115 (2017)"},{"key":"1542_CR3","unstructured":"Sindhu, B.., Dr. Noorullah, R.M.: Secure elliptic curve digital signature algorithm for Internet of Things. Glob. J. Comput. Sci. Technol. Netw. Web Secur. 16. Online ISSN: 0975-4172 & Print ISSN: 0975-4350 (2016)"},{"key":"1542_CR4","unstructured":"Alowolodu, O.D. et al.: Secured cloud application platform using elliptic curve cryptography. In: Proceedings of the World Congress on Engineering and Computer Science 2016, Vol I WCECS 2016, October 19\u201321 (2016)"},{"issue":"2","key":"1542_CR5","first-page":"498","volume":"6","author":"H Kumar","year":"2016","unstructured":"Kumar, H., Singh, A.: Internet of Things: a comprehensive analysis and security implementation through elliptic curve cryptography. Int. J. Curr. Eng. Technol. 6(2), 498\u2013502 (2016)","journal-title":"Int. J. Curr. Eng. Technol."},{"key":"1542_CR6","doi-asserted-by":"publisher","unstructured":"Xu, Q., Wu, J., Chen, Q.: A novel mobile personalized recommended method based on money flow model for stock exchange. Math. Probl. Eng. \nhttps:\/\/doi.org\/10.1155\/2014\/353910\n\n (2014)","DOI":"10.1155\/2014\/353910"},{"key":"1542_CR7","unstructured":"Agrawal, H., Badadapure, P.R.: A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET). 03(04). \nhttp:\/\/www.irjet.net\/\n\n. p-ISSN: 2395-0072, e-ISSN: 2395-0056 (2016)"},{"key":"1542_CR8","unstructured":"Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 5(3), ISSN: 2278-1323 (2016)"},{"key":"1542_CR9","unstructured":"Mani Mullai, A.: A survey on the security features of cryptographic techniques in mobile devices. Int. J. Innov. Res. Comput. Commun. Eng. 4(2) (2016)"},{"key":"1542_CR10","unstructured":"Abdulrahman, Y.A., et al.: Internet of Things: issues and challenges. J. Theor. Appl. Inf. Technol. 94(1). \nhttp:\/\/www.jatit.org\n\n. ISSN: 1992-8645, E-ISSN: 1817-3195 (2016)"},{"issue":"4","key":"1542_CR11","first-page":"3604","volume":"6","author":"V Sunkari","year":"2015","unstructured":"Sunkari, V., et al.: Framework for providing security and energy saving using elliptic curve cryptography in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 6(4), 3604\u20133608 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"issue":"3","key":"1542_CR12","first-page":"63","volume":"8","author":"YS Lee","year":"2014","unstructured":"Lee, Y.S., Alasaarela, E., Lee, Hoon Jae: An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Secur. Appl. 8(3), 63\u201370 (2014)","journal-title":"Int. J. Secur. Appl."},{"key":"1542_CR13","unstructured":"Fadnis, A.V., Nimbhorkar, S.U.: Text cryptosystem based on elliptic curve cryptography for networks. IJCAT Int. J. Comput. Technol. 1(3), ISSN: 2348-6090 (2014)"},{"issue":"6","key":"1542_CR14","first-page":"7296","volume":"5","author":"Christina Thomas","year":"2014","unstructured":"Thomas, Christina, et al.: A survey on various algorithms used for elliptic curve cryptography. Int. J. Comput. Sci. Inf. Technol. 5(6), 7296\u20137301 (2014)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"issue":"4","key":"1542_CR15","first-page":"322","volume":"11","author":"A Sakthivel","year":"2014","unstructured":"Sakthivel, A., Nedunchezhian, R.: Analyzing the point multiplication operation of elliptic curve cryptosystem over prime field for parallel processing. Int. Arab J. Inf. Technol. 11(4), 322\u2013328 (2014)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"5","key":"1542_CR16","doi-asserted-by":"publisher","first-page":"158","DOI":"10.5755\/j01.eee.20.5.7118","volume":"20","author":"J Toldinas","year":"2014","unstructured":"Toldinas, J., Damasevicius, R., Venckauskas, A., Blazauskas, T., Ceponis, J.: Energy consumption of cryptographic algorithms in mobile devices. Elektron. Elektrotech. 20(5), 158\u2013161 (2014). \nhttps:\/\/doi.org\/10.5755\/j01.eee.20.5.7118","journal-title":"Elektron. Elektrotech."},{"key":"1542_CR17","unstructured":"Sahoo, P.K., et al.: An implementation of elliptic curve cryptography. Int. J. Eng. Res. Technol. (IJERT). 2(1), ISSN: 2278-0181 (2013)"},{"key":"1542_CR18","unstructured":"Karthikeyan, E.: Survey of elliptic curve scalar multiplication algorithms. Int. J. Adv. Netw. Appl. 04(02), 1581\u20131590. ISSN: 0975-0290 (2012)"},{"issue":"10","key":"1542_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.5755\/j01.eee.18.10.3069","volume":"18","author":"R Damasevicius","year":"2012","unstructured":"Damasevicius, R., Ziberkas, G., Stuikys, V., Toldinas, J.: Energy consumption of hash functions. Elektron. Elektrotech. 18(10), 81\u201384 (2012). \nhttps:\/\/doi.org\/10.5755\/j01.eee.18.10.3069","journal-title":"Elektron. Elektrotech."},{"key":"1542_CR20","doi-asserted-by":"crossref","unstructured":"Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Electron. Electr. Eng. 2(108). ISSN: 1392-1215 (2011)","DOI":"10.5755\/j01.eee.108.2.134"},{"key":"1542_CR21","doi-asserted-by":"crossref","unstructured":"Katiyar, V., et al.: A survey on elliptic curve cryptography for pervasive computing environment. Int. J. Comput. Appl. 11(10). ISSN: 0975-8887 (2010)","DOI":"10.5120\/1615-2171"},{"issue":"3","key":"1542_CR22","first-page":"213","volume":"10","author":"DSA Elminaam","year":"2010","unstructured":"Elminaam, D.S.A., et al.: Evaluating the performance of symmetric encryption algorithms. Int. J. Netw. Secur. 10(3), 213\u2013219 (2010)","journal-title":"Int. J. Netw. Secur."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1542-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1542-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1542-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T22:58:49Z","timestamp":1574377129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1542-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,3]]},"references-count":22,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1542"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1542-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,3]]},"assertion":[{"value":"14 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}