{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:58:02Z","timestamp":1772063882344,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T00:00:00Z","timestamp":1531440000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12652-018-0939-4","type":"journal-article","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T10:57:38Z","timestamp":1531479458000},"page":"2633-2643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A high security and efficiency protection of confidentiality and integrity for off-chip memory"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3619-7936","authenticated-orcid":false,"given":"Yang","family":"Su","sequence":"first","affiliation":[]},{"given":"Jun-Wei","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Min-Qing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,13]]},"reference":[{"key":"939_CR1","first-page":"134","volume":"224","author":"T Andrea","year":"2015","unstructured":"Andrea T, Holger H (2015) Polynomial time decision algorithms for probabilistic automata. Inf Comput 224:134\u2013171","journal-title":"Inf Comput"},{"key":"939_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.04.013","author":"Y Damla","year":"2018","unstructured":"Damla Y, Heba Y (2018) Power analysis based side-channel attack on visible light communication [online]. Phys Commun. \n                    https:\/\/doi.org\/10.1016\/j.phycom.2018.04.013","journal-title":"Phys Commun"},{"issue":"5","key":"939_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S1005-8885(15)60674-4","volume":"22","author":"L Duan","year":"2015","unstructured":"Duan L, Hongxin ZH, Qiang L et al (2015) Electromagnetic side-channel attack based on PSO directed acyclic graph SVM. J China Univ Posts Telecommun 22(5):10\u201315","journal-title":"J China Univ Posts Telecommun"},{"key":"939_CR4","doi-asserted-by":"crossref","unstructured":"Elbaz R, Torres L, Sassatelli G et al (2006) A parallelized way to provide data encryption and integrity checking on a processor-memory bus. In: Proceedings of the 43rd annual design automation conference. ACM, pp 506\u2013509","DOI":"10.1145\/1146909.1147042"},{"key":"939_CR5","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-540-74735-2_20","volume-title":"Cryptographic hardware and embedded systems-CHES 2007","author":"R Elbaz","year":"2007","unstructured":"Elbaz R, Champagne D, Lee RB et al (2007) Tec-tree: a low-cost, parallelizable tree for efficient defense against memory replay attacks. In: Cryptographic hardware and embedded systems-CHES 2007. Springer, Berlin Heidelberg, pp\u00a0289\u2013302"},{"key":"939_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jnca.2017.10.016","volume":"101","author":"U Faheem","year":"2018","unstructured":"Faheem U, Matthew E, Rajiv R (2018) Data exfiltration: A review of external attack vectors and countermeasures. J Netw Comput Appl 101:18\u201354","journal-title":"J Netw Comput Appl"},{"key":"939_CR7","volume-title":"Research on key techniques of memory system data confidentiality and integrity protection","author":"H Fangyong","year":"2005","unstructured":"Fangyong H (2005) Research on key techniques of memory system data confidentiality and integrity protection. National University of Defense Technology, Changsha"},{"key":"939_CR8","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jss.2016.07.028","volume":"120","author":"ZH Hailong","year":"2016","unstructured":"Hailong ZH, Yongbin ZH (2016) How many interesting points should be used in a template attack. J Syst Softw 120:105\u2013113","journal-title":"J Syst Softw"},{"key":"939_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.013","author":"L Hojoon","year":"2018","unstructured":"Hojoon L, Minsu K, Yunheung P et al (2018) A dynamic per-context verification of kernel address integrity from external monitors [online]. Comput Secur. \n                    https:\/\/doi.org\/10.1016\/j.cose.2018.02.013","journal-title":"Comput Secur"},{"key":"939_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.measurement.2018.04.047","volume":"123","author":"A Hong","year":"2018","unstructured":"Hong A, Xuebin CH (2018) Research on embedded access control security system and face recognition system [J]. Measurement 123:309\u2013322","journal-title":"Measurement"},{"key":"939_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-13869-0_19","volume-title":"An improved memory integrity protection scheme. Trust and trustworthy computing","author":"Y Hu","year":"2010","unstructured":"Hu Y, Sunar B (2010) An improved memory integrity protection scheme. Trust and trustworthy computing. Springer, Berlin, pp\u00a0273\u2013281"},{"key":"939_CR12","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1016\/j.energy.2016.09.045","volume":"115","author":"AB Jaime","year":"2016","unstructured":"Jaime AB, Leonel PT, Rolf Fredi M et al (2016) An embedded system approach for energy monitoring and analysis in industrial processes. Energy 115:811\u2013819","journal-title":"Energy"},{"key":"939_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.matcom.2016.07.011","volume":"143","author":"L Jie","year":"2018","unstructured":"Jie L, Jianliang ZH (2018) Paula Whitlock. Efficient deterministic and non-deterministic pseudorandom number generation. Math Comput Simul 143:114\u2013124","journal-title":"Math Comput Simul"},{"key":"939_CR14","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.procs.2014.07.031","volume":"34","author":"B Kemal","year":"2014","unstructured":"Kemal B, Devrim U, Nadir A et al (2014) Mobile authentication secure against man-in-the-middle attacks. Procedia Comput Sci 34:323\u2013329","journal-title":"Procedia Comput Sci"},{"key":"939_CR15","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.physa.2017.08.055","volume":"490","author":"Y Liang","year":"2018","unstructured":"Liang Y, Lichen SH, Junyan ZH et al (2018) Heterogeneous information network model for equipment standard system. Phys A 490:935\u2013943","journal-title":"Phys A"},{"key":"939_CR16","doi-asserted-by":"crossref","unstructured":"Lie D, Thekkath CA, Horowitz M (2003) Implementing an untrusted operating system on trusted hardware. In ACM SIGOPS operating systems review, ACM, pp 178\u2013192","DOI":"10.1145\/1165389.945463"},{"key":"939_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.mejo.2017.02.010","volume":"62","author":"N M\u0103d\u0103lin","year":"2017","unstructured":"M\u0103d\u0103lin N, Salvador M (2017) Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis. Microelectron J 62:85\u201398","journal-title":"Microelectron J"},{"issue":"3\u20134","key":"939_CR18","first-page":"679","volume":"55","author":"J Mohsen","year":"2015","unstructured":"Mohsen J, Fathollah B (2015) Improving the reliability of the Benes network for use in large-scale systems. Microelectron Reliab 55(3\u20134):679\u2013695","journal-title":"Microelectron Reliab"},{"key":"939_CR19","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cose.2017.05.004","volume":"70","author":"M Monali","year":"2017","unstructured":"Monali M, Krishna A (2017) Modeling and analyses of IP spoofing attack in 6LoWPAN network. Comput Secur 70:95\u2013110","journal-title":"Comput Secur"},{"key":"939_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0868-2","author":"A Musa","year":"2018","unstructured":"Musa A, Gonzalez V, Barragan D, Ambient J (2018) A new strategy to optimize the sensors placement in wireless sensor networks [online]. J Ambient Intell Hum Comput. \n                    https:\/\/doi.org\/10.1007\/s12652-018-0868-2","journal-title":"J Ambient Intell Hum Comput"},{"issue":"1","key":"939_CR21","doi-asserted-by":"publisher","first-page":"7363","DOI":"10.1016\/j.ifacol.2017.08.1502","volume":"50","author":"MG Riccardo","year":"2017","unstructured":"Riccardo MG, Ferrari, Andr\u00e9 MH, Teixeira (2017) Detection and isolation of replay attacks through sensor watermarking. IFAC Pap OnLine 50(1):7363\u20137368","journal-title":"IFAC Pap OnLine"},{"key":"939_CR22","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.cose.2018.02.020","volume":"76","author":"H Ryan","year":"2018","unstructured":"Ryan H, George L (2018) Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. Comput Secur 76:101\u2013127","journal-title":"Comput Secur"},{"issue":"1","key":"939_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/2501626.2512456","volume":"13","author":"JCM Santos","year":"2013","unstructured":"Santos JCM, Fei Y (2013) Leveraging speculative architectures for runtime program validation. ACM Trans Embedd Comput Syst 13(1):3","journal-title":"ACM Trans Embedd Comput Syst"},{"key":"939_CR24","doi-asserted-by":"crossref","unstructured":"Schraml R, Hofbauer H, Petutschnigg A et al (2015) Tree log identification based on digital cross-section images of log ends using fingerprint and iris recognition methods. In: International conference on computer analysis of images and patterns, CAIP 2015, pp 752\u2013765","DOI":"10.1007\/978-3-319-23192-1_63"},{"key":"939_CR25","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1016\/j.procs.2017.05.316","volume":"109","author":"S Shubhabrata","year":"2017","unstructured":"Shubhabrata S, J\u00f6rn WJ (2017) Aegis: reliable application execution over the mobile cloud. Procedia Comput Sci 109:482\u2013489","journal-title":"Procedia Comput Sci"},{"key":"939_CR26","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.dam.2018.01.010","volume":"243","author":"KB Susil","year":"2018","unstructured":"Susil KB, Vashek M (2018) Investigating results and performance of search and construction algorithms for word-based LFSRs, \u03c3-LFSRs. Discret Appl Math 243:90\u201398","journal-title":"Discret Appl Math"},{"key":"939_CR27","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.jpdc.2016.12.016","volume":"106","author":"ZH Xiaojun","year":"2017","unstructured":"Xiaojun ZH, Amine ASA, Abbes A et al (2017) ECG encryption and identification based security solution on the Zynq SoC for connected health systems. J Parallel Distrib Comput 106:143\u2013152","journal-title":"J Parallel Distrib Comput"},{"key":"939_CR28","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.optlaseng.2017.06.015","volume":"107","author":"W Xingyuan","year":"2018","unstructured":"Xingyuan W, Xiaoqiang ZH, Xiangjun W et al (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370\u2013379","journal-title":"Opt Lasers Eng"},{"key":"939_CR29","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.parco.2016.01.001","volume":"52","author":"F Xiongwei","year":"2016","unstructured":"Xiongwei F, Kenli L, Wangdong Y et al (2016) A secure and efficient file protecting system based on SHA3 and parallel AES. Parallel Comput 52:106\u2013132","journal-title":"Parallel Comput"},{"key":"939_CR30","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.procs.2018.03.083","volume":"129","author":"G Yuan","year":"2018","unstructured":"Yuan G, Hong A, Zenghui F et al (2018) Mobile network security and privacy in WSN. Procedia Comput Sci 129:324\u2013330","journal-title":"Procedia Comput Sci"},{"key":"939_CR31","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.parco.2015.12.003","volume":"54","author":"RQ Yun","year":"2016","unstructured":"Yun RQ, Viktor KP (2016) Compact hash tables for decision-trees. Parallel Comput 54:121\u2013127","journal-title":"Parallel Comput"},{"key":"939_CR32","first-page":"58","volume":"21","author":"L Zhe","year":"2018","unstructured":"Zhe L, Hwajeong S, Chien-Ning CH et al (2018) Secure GCM implementation on AVR. Discret Appl Math 21:58\u201366","journal-title":"Discret Appl Math"},{"key":"939_CR33","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.sigpro.2017.10.004","volume":"144","author":"H Zhongyun","year":"2018","unstructured":"Zhongyun H, Shuang Y, Yicong ZH (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134\u2013144","journal-title":"Signal Process"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0939-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0939-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0939-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T19:12:51Z","timestamp":1562958771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0939-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,13]]},"references-count":33,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["939"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0939-4","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,13]]},"assertion":[{"value":"16 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}