{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T05:56:24Z","timestamp":1723096584941},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T00:00:00Z","timestamp":1646179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11277-022-09557-6","type":"journal-article","created":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T03:02:46Z","timestamp":1646190166000},"page":"421-451","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Euler Phi Function and Gamma Function Based Elliptic Curve Encryption for Secured Group Communication"],"prefix":"10.1007","volume":"125","author":[{"given":"S.","family":"Viswanathan","sequence":"first","affiliation":[]},{"given":"R. S.","family":"Bhuvaneswaran","sequence":"additional","affiliation":[]},{"given":"Sannasi","family":"Ganapathy","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,2]]},"reference":[{"issue":"2","key":"9557_CR1","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1007\/s11277-019-06610-9","volume":"109","author":"E Gurumoorthi","year":"2019","unstructured":"Gurumoorthi, E., & Ayyasamy, A. (2019). Cache agent based location aided routing protocol using direction for performance enhancement in VANET. Wireless Personal Communications, 109(2), 1195\u20131216.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"9557_CR2","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11277-020-07705-4","volume":"116","author":"SVN Munuswamy Selvi","year":"2021","unstructured":"Munuswamy Selvi, S. V. N., Kumar, S., Ganapathy, S., Ayyanar, A., Nehemiah, H. K., & Kannan, A. (2021). An energy efficient clustered gravitational and fuzzy based routing algorithm in WSNs. Wireless Personal Communications, 116(1), 61\u201390.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"9557_CR3","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s12652-020-02088-7","volume":"12","author":"J Sumathi","year":"2021","unstructured":"Sumathi, J., & Velusamy, R. L. (2021). A review on distributed cluster based routing approaches in mobile wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12(1), 835\u2013849.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"2","key":"9557_CR4","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1007\/s11276-020-02532-8","volume":"27","author":"BDLSK Selvakumar","year":"2021","unstructured":"Selvakumar, B. D. L. S. K. (2021). Intelligent energy-aware and secured QoS routing protocol with dynamic mobility estimation for wireless sensor networks. Wireless Networks, 27(2), 1503\u20131514.","journal-title":"Wireless Networks"},{"key":"9557_CR5","doi-asserted-by":"publisher","first-page":"107547","DOI":"10.1016\/j.ijepes.2021.107547","volume":"135","author":"X Jiang","year":"2022","unstructured":"Jiang, X., Sun, C., Cao, L., Law, N.-F., & Loo, K. H. (2022). Semi-decentralized energy routing algorithm for minimum-loss transmission in community energy internet. International Journal of Electrical Power & Energy Systems, 135, 107547.","journal-title":"International Journal of Electrical Power & Energy Systems"},{"issue":"6","key":"9557_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information\u2019s theory, 22(6), 644\u2013654.","journal-title":"IEEE transactions on Information\u2019s theory"},{"key":"9557_CR7","volume-title":"The arithmetic of elliptic curves","author":"GH Silverman","year":"1985","unstructured":"Silverman, G. H. (1985). The arithmetic of elliptic curves. Springer."},{"issue":"4","key":"9557_CR8","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1007\/s11276-016-1206-2","volume":"23","author":"D Lin","year":"2017","unstructured":"Lin, D., & Wang, Q. (2017). A game theory based energy efficient clustering routing protocol for WSNs. Wireless Networks, 23(4), 1101\u20131111.","journal-title":"Wireless Networks"},{"issue":"2","key":"9557_CR9","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s11277-020-07882-2","volume":"117","author":"S Prithi","year":"2021","unstructured":"Prithi, S., & Sumathi, S. (2021). Automata based hybrid PSO\u2013GWO algorithm for secured energy efficient optimal routing in wireless sensor network. Wireless Personal Communications, 117(2), 545\u2013559.","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"9557_CR10","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1016\/j.camwa.2012.01.038","volume":"65","author":"P Vijayakumar","year":"2013","unstructured":"Vijayakumar, P., Bose, S., & Kannan, A. (2013). Centralized key distribution protocol using the greatest common divisor method. Computers & Mathematics with Applications, 65(9), 1360\u20131368.","journal-title":"Computers & Mathematics with Applications"},{"key":"9557_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2020.102317","volume":"110","author":"P Maheshwari","year":"2021","unstructured":"Maheshwari, P., Sharma, A. K., & Verma, K. (2021). Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad-Hoc Networks, 110, 1\u201313.","journal-title":"Ad-Hoc Networks"},{"key":"9557_CR12","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1007\/s11036-020-01523-5","volume":"25","author":"M Shafiq","year":"2020","unstructured":"Shafiq, M., Ashraf, H., Ullah, A., & Tahira, S. (2020). Systematic literature review on energy efficient routing schemes in WSN \u2013 A survey. Mobile Networks and Applications, 25, 882\u2013895.","journal-title":"Mobile Networks and Applications"},{"issue":"10","key":"9557_CR13","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.1109\/JSEN.2012.2205674","volume":"12","author":"S Murthy","year":"2012","unstructured":"Murthy, S., Souza, R. J. D., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Transactions on Sensors Journal, 12(10), 2941\u20132949.","journal-title":"IEEE Transactions on Sensors Journal"},{"key":"9557_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.future.2019.04.006","volume":"99","author":"M Shamim Hossain","year":"2019","unstructured":"Shamim Hossain, M., You, X., Xiao, W., Luc, J., & Song, E. (2019). QoS-oriented multimedia transmission using multipath routing. Future Generation Computer Systems, 99, 226\u2013234.","journal-title":"Future Generation Computer Systems"},{"key":"9557_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5579252","volume":"2021","author":"J Xiao","year":"2021","unstructured":"Xiao, J., Liu, Y., Qin, H., Li, C., & Zhou, J. (2021). A novel QoS routing energy consumption optimization method based on clone adaptive whale optimization algorithm in IWSNs. Journal of Sensors, 2021, 1\u201317. https:\/\/doi.org\/10.1155\/2021\/5579252","journal-title":"Journal of Sensors"},{"key":"9557_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.compeleceng.2018.03.036","volume":"68","author":"R Logambigai","year":"2018","unstructured":"Logambigai, R., Ganapathy, S., & Kannan, A. (2018). Energy\u2013efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62\u201375.","journal-title":"Computers & Electrical Engineering"},{"issue":"19","key":"9557_CR17","doi-asserted-by":"publisher","first-page":"3207","DOI":"10.1049\/iet-com.2019.0039","volume":"13","author":"M Ponguwala","year":"2019","unstructured":"Ponguwala, M., & Rao, S. (2019). E2-SR: A novel energy-efficient secure routing scheme to protect MANET-IoT. IET Communications, 13(19), 3207\u20133216.","journal-title":"IET Communications"},{"issue":"2","key":"9557_CR18","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1007\/s11277-021-08101-2","volume":"118","author":"M Maheswari","year":"2021","unstructured":"Maheswari, M., & Karthika, R. A. (2021). A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Personal Communications, 118(2), 1535\u20131557.","journal-title":"Wireless Personal Communications"},{"key":"9557_CR19","unstructured":"Heinzelman, W. R., Chandrakasan, A. P., Balakrishnan (2000). Energy-efficient communication protocol for wireless microsensor networks, Proceedings of IEEE 33rd annual Hawaii International Conference on System Sciences, Vol. 2, pp. 1\u201310."},{"issue":"4","key":"9557_CR20","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WR Heinzelman","year":"2002","unstructured":"Heinzelman, W. R., Chandrakasan, A. P., & Balakrishnan. (2002). An application specific protocol architecture for wireless sensor network. IEEE Transaction on Wireless Communication, 1(4), 660\u2013670.","journal-title":"IEEE Transaction on Wireless Communication"},{"issue":"4","key":"9557_CR21","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366\u2013379.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"9557_CR22","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.comcom.2019.09.005","volume":"148","author":"N Rajendran","year":"2019","unstructured":"Rajendran, N., Jawahar, P. K., & Priyadarshini, R. (2019). Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, 129\u2013135.","journal-title":"Computer Communications"},{"key":"9557_CR23","volume-title":"Cryptography and network security principles and practices","author":"W Stallings","year":"2005","unstructured":"Stallings, W. (2005). Cryptography and network security principles and practices. Prentice Hall."},{"key":"9557_CR24","volume-title":"Cryptography and network security","author":"A Forouzan","year":"2015","unstructured":"Forouzan, A. (2015). Cryptography and network security. McGraw Hill Education."},{"key":"9557_CR25","doi-asserted-by":"crossref","unstructured":"Miller, V. S. (1986). Use of elliptic curves in cryptography. In Lecture Notes in Computer Sciences on Advances in cryptology- CRYPTO85. Berlin, Heidelberg: Springer-Verlag. 1986, pp.417\u2013426. URLhttp:\/\/dl.acm.org\/citation.cfm?id=18262.25413.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"9557_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11277-019-07013-6","volume":"112","author":"R Geetha","year":"2020","unstructured":"Geetha, R., Padmavathy, T., Thilagam, T., & Lallithasree, A. (2020). Tamilian cryptography: An efficient hybrid symmetric key encryption algorithm. Wireless Personal Communications, 112, 21\u201336.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"9557_CR27","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1007\/s12083-019-00821-4","volume":"13","author":"G Sangeetha","year":"2020","unstructured":"Sangeetha, G., Vijayalakshmi, M., Ganapathy, S., & Kannan, A. (2020). An improved congestion-aware routing mechanism in sensor networks using fuzzy rule sets. Peer Peer Networking and Applications, 13(3), 890\u2013904.","journal-title":"Peer Peer Networking and Applications"},{"issue":"177","key":"9557_CR28","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1978","unstructured":"Koblitz, N. (1978). Elliptic curve cryptosystem. Mathematics of Computation, 48(177), 203\u2013209.","journal-title":"Mathematics of Computation"},{"issue":"2","key":"9557_CR29","first-page":"649","volume":"126","author":"WL Jr Hendrik","year":"1987","unstructured":"Jr Hendrik, W. L. (1987). Factoring integers with elliptic curves. Annals of Mathematics, 126(2), 649\u2013673.","journal-title":"Annals of Mathematics"},{"issue":"13","key":"9557_CR30","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1016\/S0140-3664(99)00121-8","volume":"22","author":"M Peyravian","year":"1999","unstructured":"Peyravian, M., Matyas, S. M., & Zunic, N. (1999). Decentralized group key management for secure multicast communications. Computer Communications, 22(13), 1183\u20131187.","journal-title":"Computer Communications"},{"issue":"1","key":"9557_CR31","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/S0167-4048(99)80002-9","volume":"18","author":"Bill Hancock CISSP","year":"1999","unstructured":"Bill Hancock CISSP. (1999). Elliptical curve cryptography and standards for efficient cryptography group. Computers & Security, 18(1), 4\u201315.","journal-title":"Computers & Security"},{"issue":"4","key":"9557_CR32","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.jss.2010.11.926","volume":"84","author":"Y-L Lin","year":"2011","unstructured":"Lin, Y.-L., & Hsu, C.-L. (2011). Secure key management scheme for dynamic hierarchical access control based on ECC. Journal of Systems and Software, 84(4), 679\u2013685.","journal-title":"Journal of Systems and Software"},{"key":"9557_CR33","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.optcom.2013.06.044","volume":"309","author":"D Fan","year":"2013","unstructured":"Fan, D., Meng, X. F., Wang, Y., Yang, X., Peng, X., He, W., Dong, G., & Chen, H. (2013). Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm. Optics Communications, 309, 50\u201356.","journal-title":"Optics Communications"},{"issue":"3","key":"9557_CR34","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1049\/iet-ifs.2012.0352","volume":"8","author":"P Vijayakumar","year":"2014","unstructured":"Vijayakumar, P., Bose, S., & Kannan, A. (2014). Chinese remainder theorem based centralised group key management for secure multicast communication. IET information Security, 8(3), 179\u2013187.","journal-title":"IET information Security"},{"key":"9557_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2015.05.008","volume":"72","author":"B Daghighi","year":"2015","unstructured":"Daghighi, B., Kiah, M. L. M., Shamshirband, S., Iqbal, S., & Asghari, P. (2015). Key management paradigm for mobile secure group communications: Issues, solutions, and challenges. Computer Communications, 72, 1\u201316.","journal-title":"Computer Communications"},{"issue":"4","key":"9557_CR36","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1109\/TITS.2015.2492981","volume":"17","author":"P Vijayakumar","year":"2016","unstructured":"Vijayakumar, P., Azees, M., Kannan, A., & Deborah, L. J. (2016). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 1015\u20131028.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"9","key":"9557_CR37","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013\u20132027.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"9557_CR38","first-page":"237","volume":"14","author":"Z Liu","year":"2017","unstructured":"Liu, Z., Huang, X., Hu, Z., Khan, M. K., Seo, H., & Zhou, L. (2017). On emerging family of elliptic curves to secure Internet of Things: ECC comes of age. IEEE Transactions on Dependable and Secure Computing, 14(3), 237\u2013248.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"9557_CR39","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1007\/s11276-017-1549-3","volume":"24","author":"SVN Santhosh Kumar","year":"2018","unstructured":"Santhosh Kumar, S. V. N., & Palanichamy, Y. (2018). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks, 24(4), 1343\u20131360.","journal-title":"Wireless Networks"},{"issue":"4","key":"9557_CR40","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1007\/s11277-019-06788-y","volume":"110","author":"T Kalidoss","year":"2020","unstructured":"Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637\u20131658.","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"9557_CR41","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.jksuci.2017.12.014","volume":"32","author":"V Kumar","year":"2020","unstructured":"Kumar, V., Kumar, R., & Pandey, S. K. (2020). A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. Journal of King Saud University - Computer and Information Sciences, 32(9), 1081\u20131094.","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"9557_CR42","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.ins.2019.06.067","volume":"503","author":"L Wang","year":"2019","unstructured":"Wang, L., Tian, Y., Zhang, D., & Yanhua, Lu. (2019). Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. Information Sciences, 503, 61\u201371.","journal-title":"Information Sciences"},{"issue":"8","key":"9557_CR43","doi-asserted-by":"publisher","first-page":"4903","DOI":"10.1007\/s11276-019-02073-9","volume":"25","author":"S Viswanathan","year":"2019","unstructured":"Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with beta gamma function for secure routing in wireless sensor networks. Wireless Networks, Springer Publication., 25(8), 4903\u20134914.","journal-title":"Wireless Networks, Springer Publication."},{"issue":"3","key":"9557_CR44","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11277-019-06132-4","volume":"105","author":"P Sethuraman","year":"2019","unstructured":"Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy genetic elliptic curve Diffie Hellman algorithm for secured communication in networks. Wireless Personal Communications, 105(3), 993\u20131007.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"9557_CR45","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1007\/s11277-019-06155-x","volume":"105","author":"M Selvi","year":"2019","unstructured":"Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475\u20131490.","journal-title":"Wireless Personal Communications"},{"key":"9557_CR46","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.comnet.2019.01.032","volume":"151","author":"B Prabhu Kavin","year":"2019","unstructured":"Prabhu Kavin, B., & Ganapathy, S. (2019). A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. Computer Networks, 151, 181\u2013190.","journal-title":"Computer Networks"},{"issue":"3","key":"9557_CR47","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/TII.2019.2927512","volume":"16","author":"D Abbasinezhad-Mood","year":"2020","unstructured":"Abbasinezhad-Mood, D., Ostad-Sharif, A., Nikooghadam, M., & Mazinani, S. M. (2020). A secure and efficient key establishment scheme for communications of smart meters and service providers in smart grid. IEEE Transactions on Industrial Informatics, 16(3), 1495\u20131502. https:\/\/doi.org\/10.1109\/TII.2019.2927512","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"9557_CR48","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TII.2019.2950465","volume":"16","author":"GK Kurt","year":"2020","unstructured":"Kurt, G. K., Khosroshahi, Y., Ozdemir, E., Tavakkoli, N., & Topal, O. A. (2020). A hybrid key generation and a verification scheme. IEEE Transactions on Industrial Informatics, 16(1), 703\u2013714. https:\/\/doi.org\/10.1109\/TII.2019.2950465","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"9557_CR49","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1049\/iet-ifs.2018.5443","volume":"14","author":"I Gharsallah","year":"2020","unstructured":"Gharsallah, I., Smaoui, S., & Zarai, F. (2020). An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks. IET Information Security, 14(1), 21\u201329.","journal-title":"IET Information Security"},{"key":"9557_CR50","doi-asserted-by":"publisher","first-page":"67555","DOI":"10.1109\/ACCESS.2020.2985719","volume":"8","author":"S Shin","year":"2020","unstructured":"Shin, S., & Kwon, T. (2020). A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access, 8, 67555\u201367571. https:\/\/doi.org\/10.1109\/ACCESS.2020.2985719","journal-title":"IEEE Access"},{"key":"9557_CR51","doi-asserted-by":"publisher","first-page":"102097","DOI":"10.1016\/j.scs.2020.102097","volume":"56","author":"TK Dang","year":"2020","unstructured":"Dang, T. K., Pham, C. D. M., & Nguyen, T. L. P. (2020). A pragmatic elliptic curve cryptography-based extension for energy-efficient device-to-device communications in smart cities. Sustainable Cities and Society, 56, 102097.","journal-title":"Sustainable Cities and Society"},{"issue":"3","key":"9557_CR52","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jksuci.2015.11.001","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University - Computer and Information Sciences, 28(3), 262\u2013275.","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"1","key":"9557_CR53","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11235-015-0068-8","volume":"61","author":"A Ahmed","year":"2016","unstructured":"Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2016). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123\u2013140.","journal-title":"Telecommunication Systems"},{"issue":"1","key":"9557_CR54","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.aej.2018.12.004","volume":"58","author":"A Mazinani","year":"2019","unstructured":"Mazinani, A., Mazinani, S. M., & Mirzaie, M. (2019). FMCR-CT: An energy-efficient fuzzy multi-cluster based routing with a constant threshold in wireless sensor network. Alexandria Engineering Journal, 58(1), 127\u2013141.","journal-title":"Alexandria Engineering Journal"},{"issue":"2","key":"9557_CR55","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11276-014-0801-3","volume":"21","author":"A Ayyasamy","year":"2015","unstructured":"Ayyasamy, A., & Venkatachalapathy, K. (2015). Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wireless Networks, 21(2), 421\u2013430.","journal-title":"Wireless Networks"},{"issue":"4","key":"9557_CR56","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1007\/s11277-019-06357-3","volume":"107","author":"A Beheshtiasl","year":"2019","unstructured":"Beheshtiasl, A., & Ghaffari, A. (2019). Secure and trust-aware routing scheme in wireless sensor networks. Wireless Personal Communication, 107(4), 1799\u20131804.","journal-title":"Wireless Personal Communication"},{"key":"9557_CR57","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s001459900052","volume":"12","author":"Nigel P Smart","year":"1999","unstructured":"Smart, Nigel P. (1999). The discrete logarithm on elliptic curves of trace one. Journal of cryptology, 12, 193\u2013196.","journal-title":"Journal of cryptology"},{"key":"9557_CR58","doi-asserted-by":"crossref","unstructured":"Andrews, G. E. Askey, R. & Roy, R. (1999). Special Functions. In: Encyclopedia of mathematics and its application, Vol.71","DOI":"10.1017\/CBO9781107325937"},{"issue":"260","key":"9557_CR59","doi-asserted-by":"publisher","first-page":"2161","DOI":"10.1090\/S0025-5718-07-01980-1","volume":"76","author":"R Broker","year":"2007","unstructured":"Broker, R., & Stevenhagen, P. (2007). Efficient CM-construction of elliptic curves over finite field. Mathematics of Computation, 76(260), 2161\u20132179.","journal-title":"Mathematics of computation"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09557-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09557-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09557-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T13:42:35Z","timestamp":1656596555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09557-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,2]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["9557"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09557-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,2]]},"assertion":[{"value":"31 January 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}