{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T17:33:59Z","timestamp":1749058439879},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T00:00:00Z","timestamp":1432252800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11277-015-2748-9","type":"journal-article","created":{"date-parts":[[2015,5,21]],"date-time":"2015-05-21T11:21:33Z","timestamp":1432207293000},"page":"449-462","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Hybrid Cryptographic Algorithm, Consuming Less Time for Exchanging Information in Wireless Sensor Networks"],"prefix":"10.1007","volume":"85","author":[{"given":"Piyar Ali","family":"Jatoi","sequence":"first","affiliation":[]},{"given":"Aftab A.","family":"Memon","sequence":"additional","affiliation":[]},{"given":"B. S.","family":"Chowdhry","sequence":"additional","affiliation":[]},{"given":"M. Ghazanfar","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Shiraz","family":"Latif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,22]]},"reference":[{"key":"2748_CR1","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. A. (1998) A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 120\u2013126."},{"key":"2748_CR2","doi-asserted-by":"crossref","unstructured":"Heinzelman, W., Kulik, J., & Balakrishnan, H. (1999). Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the 5th ACM\/IEEE mobicom conference, Seattle, WA.","DOI":"10.1145\/313451.313529"},{"issue":"3","key":"2748_CR3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1177\/10943420020160030901","volume":"16","author":"M Chu","year":"2002","unstructured":"Chu, M., Haussecker, H., & Zhao, F. (2002). Scalable information-driven sensor querying and routing farad hoc heterogeneous sensor networks. The International Journal of High Performance Computing Applications, 16(3), 293\u2013313.","journal-title":"The International Journal of High Performance Computing Applications"},{"key":"2748_CR4","doi-asserted-by":"crossref","unstructured":"Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., & Sichitiu, F. M. (2003). Analyzing and modeling encryption overhead for sensor network nodes. In Proceedings of the WSNA, pp. 151\u2013159.","DOI":"10.1145\/941350.941372"},{"key":"2748_CR5","unstructured":"Karlof, C., & Wagner, D. (2003). Secure routing in sensor networks: Attacks and counter measures. In Proceedings of the 1st IEEE workshop on sensor network protocols and applications, pp. 1\u201315."},{"key":"2748_CR6","doi-asserted-by":"crossref","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., & Shantz, S. (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of the 6th international workshop on cryptographic hardware and embedded systems, Cambridge, MA, pp. 119\u2013132.","DOI":"10.1007\/978-3-540-28632-5_9"},{"issue":"6","key":"2748_CR7","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53\u201357.","journal-title":"Communications of the ACM"},{"issue":"2","key":"2748_CR8","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1145\/1105688.1105691","volume":"1","author":"D Liu","year":"2005","unstructured":"Liu, D., & Ning, P. (2005). Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks, 1(2), 204\u2013239.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"2748_CR9","unstructured":"Renesse, R. D. & Aghvami, A. H. (2005). Formal verification of ad-hoc routing protocols using spin model checker. In IEEE melecon, pp. 12\u201315."},{"key":"2748_CR10","doi-asserted-by":"crossref","unstructured":"Wander, A., Gura, N., Eberle, H., Gupta, V., & Shantz, S. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the third IEEE international conference on pervasive computing and communications (PERCOM), pp. 324\u2013328, March 08\u201312.","DOI":"10.1109\/PERCOM.2005.18"},{"issue":"2","key":"2748_CR11","first-page":"139","volume":"2","author":"K Kifayat","year":"2007","unstructured":"Kifayat, K., Merabti, M., Shi, Q., & Llewellyn-Jones, L. (2007). Group based secure communication for large-scale wireless sensor networks. Journal of Information Assurance and Security, 2(2), 139\u2013147.","journal-title":"Journal of Information Assurance and Security"},{"key":"2748_CR12","first-page":"48","volume":"4","author":"M Rousan","year":"2007","unstructured":"Rousan, M., Rjoub, A., & Baset, A. (2007). A low-energy security algorithm for exchanging information in wireless sensor networks. Journal of Information Assurance and Security, 4, 48\u201359.","journal-title":"Journal of Information Assurance and Security"},{"issue":"3","key":"2748_CR13","first-page":"189","volume":"2","author":"A Sorniotti","year":"2007","unstructured":"Sorniotti, A., K, L. Gomez., & Odorico, L. (2007). Secure and trusted in-network data processing in wireless sensor networks: A survey. Journal of Information Assurance and Security, 2(3), 189\u2013199.","journal-title":"Journal of Information Assurance and Security"},{"issue":"3","key":"2748_CR14","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.antiviral.2008.04.006","volume":"79","author":"CF Basler","year":"2008","unstructured":"Basler, C. F., & Aguilar, P. V. (2008). Progress in identifying virulence determinants of the 1918 H1N1 and the Southeast Asian H5N1 influenza A viruses: Review article. Antiviral Research, 79(3), 166\u2013178.","journal-title":"Antiviral Research"},{"issue":"12","key":"2748_CR15","first-page":"2292","volume":"52","author":"YB Mukherjee","year":"2008","unstructured":"Mukherjee, Y. B., & Ghosal, D. (2008). Wireless sensor network survey, 52(12), 2292\u20132330.","journal-title":"Wireless sensor network survey"},{"issue":"4","key":"2748_CR16","first-page":"818","volume":"31","author":"S Tripathy","year":"2008","unstructured":"Tripathy, S., & Nandi, S. (2008). Defense against outside attacks in wireless sensor networks, 31(4), 818\u2013826.","journal-title":"Defense against outside attacks in wireless sensor networks"},{"issue":"18","key":"2748_CR17","first-page":"3042","volume":"53","author":"KF Ssu","year":"2009","unstructured":"Ssu, K. F., Wang, W. T., & Chang, W. C. (2009). Detecting sybil attacks in wireless sensor networks using neighboring information, 53(18), 3042\u20133056.","journal-title":"Detecting sybil attacks in wireless sensor networks using neighboring information"},{"issue":"5","key":"2748_CR18","doi-asserted-by":"crossref","first-page":"852","DOI":"10.1016\/j.jss.2009.12.021","volume":"83","author":"S Misra","year":"2010","unstructured":"Misra, S., & Thomasinous, P. D. (2010). A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks. Journal of Systems and Software, 83(5), 852\u2013860.","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"2748_CR19","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie, M., Han, S., Tian, B., & Parvin, S. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302\u20131325.","journal-title":"Journal of Network and Computer Applications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2748-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2748-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2748-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:18:22Z","timestamp":1559395102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2748-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,22]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["2748"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2748-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,22]]}}}