{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:52Z","timestamp":1740123712294,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T00:00:00Z","timestamp":1556496000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11036-019-01263-1","type":"journal-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T06:05:17Z","timestamp":1556517917000},"page":"1249-1254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Packet Encryption for Securing Real-Time Mobile Cloud Applications"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4108-6889","authenticated-orcid":false,"family":"Ajay D M","sequence":"first","affiliation":[]},{"family":"Umamaheswari E","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,29]]},"reference":[{"issue":"1","key":"1263_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/SURV.2013.062613.00160","volume":"16","author":"A u R Khan","year":"2014","unstructured":"Khan A u R, Othman M, Madani SA, Khan SU (2014) A Survey of Mobile Cloud Computing Application Models. IEEE Commun Surve Tutorials 16(1):393\u2013413","journal-title":"IEEE Commun Surve Tutorials"},{"key":"1263_CR2","volume-title":"Advances in Mobile Cloud Computing and Big Data in the 5G Era. Studies in Big Data","author":"G Skourletopoulos","year":"2017","unstructured":"Skourletopoulos G et al (2017) Towards Mobile Cloud Computing in 5G Mobile Networks: Applications, Big Data Services and Future Opportunities. In: Mavromoustakis C, Mastorakis G, Dobre C (eds) Advances in Mobile Cloud Computing and Big Data in the 5G Era. Studies in Big Data, vol 22. Springer, Cham"},{"key":"1263_CR3","unstructured":"What is mobile cloud computing? (2013) \n                              https:\/\/www.ibm.com\/blogs\/cloud-computing\/2013\/06\/mobile-cloud-computing\/\n                              \n                           . Accessed: 14-10-2017"},{"key":"1263_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","volume":"84","author":"MB Mollah","year":"2017","unstructured":"Mollah MB, Azad MAK, Vasilakos A (2017) Security and privacy challenges in mobile cloud computing: Survey and way ahead. J Netw Comput Appl 84:38\u201354","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"1263_CR5","first-page":"1","volume":"14","author":"K Akherfi","year":"2018","unstructured":"Akherfi K, Gerndt M, Harroud H (2018) Mobile cloud computing for computation offloading: Issues and challenges. Appl Comput Inf 14(1):1\u201316","journal-title":"Appl Comput Inf"},{"key":"1263_CR6","doi-asserted-by":"publisher","first-page":"1584","DOI":"10.1016\/j.jcss.2014.04.023","volume":"80","author":"Y Jung","year":"2014","unstructured":"Jung Y, Festijo E (2014) One-time packet key exchange scheme for secure real-time multimedia applications. J Comput Syst Sci 80:1584\u20131596","journal-title":"J Comput Syst Sci"},{"key":"1263_CR7","doi-asserted-by":"crossref","unstructured":"Jung Y, Festijo E (2013) Securing RTP packets using per-packet selective encryption scheme for real-time multimedia applications: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Pages: 659\u2013666","DOI":"10.1109\/TrustCom.2013.80"},{"issue":"Number 4","key":"1263_CR8","doi-asserted-by":"publisher","first-page":"726","DOI":"10.4218\/etrij.13.0212.0549","volume":"35","author":"Y Jung","year":"2013","unstructured":"Jung Y, Festijo E, Foster JWA (2013) Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia. ETRI J 35(Number 4):726\u2013729","journal-title":"ETRI J"},{"key":"1263_CR9","doi-asserted-by":"crossref","unstructured":"Rescorla E (1999) Diffie\u2013Hellman Key Agreement Method, RFC2631 (proposed standard)","DOI":"10.17487\/rfc2631"},{"key":"1263_CR10","doi-asserted-by":"crossref","unstructured":"Freier et al., (2011) The Secure Sockets Layer (SSL) Protocol Version 3.0, RFC 6101","DOI":"10.17487\/rfc6101"},{"key":"1263_CR11","unstructured":"Dierks & Rescorla (2008) The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246"},{"issue":"9","key":"1263_CR12","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727\u20131765","journal-title":"Proc IEEE"},{"key":"1263_CR13","doi-asserted-by":"crossref","unstructured":"Khasawneh M, Kajman I, Alkhudaidy R, Althubyani A (2014) A Survey on Wi-Fi Protocols: WPA and WPA2. In: Mart\u00ednez P\u00e9rez G., Thampi S.M., Ko R., Shu L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-54525-2_44"},{"key":"1263_CR14","doi-asserted-by":"crossref","unstructured":"Sheldon FT, Oak Ridge National Laboratory, Weber JM, Yoo S-M, Pan WD, (2012) The Insecurity of Wireless Networks, IEEE Security & Privacy Magazine, volume: 10, Issue: 4, Pages: 54\u201361","DOI":"10.1109\/MSP.2012.60"},{"key":"1263_CR15","doi-asserted-by":"crossref","unstructured":"Hamzeh, et al., (1999) Point-to-Point Tunneling Protocol (PPTP), RFC 2637","DOI":"10.17487\/rfc2637"},{"key":"1263_CR16","unstructured":"Microsoft Windows CE 3.0 Support of PPP and PPTP (2000). Microsoft Corporation \n                              https:\/\/msdn.microsoft.com\/en-us\/library\/ms834454.aspx\n                              \n                           . Accessed: 17-05-2018"},{"key":"1263_CR17","doi-asserted-by":"publisher","first-page":"136","DOI":"10.15837\/ijccc.2013.1.177","volume":"8","author":"D Simion","year":"2012","unstructured":"Simion D, Ursuleanu F, Mihai G, Adrian P, Dan A, Lavric A (2012) Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming. Int J Comput Commun Control 8:136","journal-title":"Int J Comput Commun Control"},{"key":"1263_CR18","doi-asserted-by":"crossref","unstructured":"Townsley, et al., (1999) Layer Two Tunneling Protocol \"L2TP\", RFC 2661","DOI":"10.17487\/rfc2661"},{"key":"1263_CR19","unstructured":"L2TP Tunnel Setup and Teardown (2018) \n                              https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/dial-access\/virtual-private-dialup-network-vpdn\/23980-l2tp-23980.html#t2\n                              \n                           . Accessed: 17-05-2018"},{"key":"1263_CR20","doi-asserted-by":"crossref","unstructured":"Frankel K (2011) IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap, RFC 6071","DOI":"10.17487\/rfc6071"},{"key":"1263_CR21","unstructured":"Rosu SM, Popescu MM, Dragoi G, Guica IR (2012) The Virtual Enterprise Network based on IPSec VPN Solutions and Management, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 11"},{"key":"1263_CR22","unstructured":"VPNs and VPN Technologies (2002) \n                              http:\/\/www.ciscopress.com\/articles\/article.asp?p=24833&seqNum=3\n                              \n                           . Accessed: 17-05-2018"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01263-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-019-01263-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01263-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T23:16:23Z","timestamp":1588029383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-019-01263-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,29]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1263"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01263-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2019,4,29]]},"assertion":[{"value":"29 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}