{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T04:00:55Z","timestamp":1774929655734,"version":"3.50.1"},"reference-count":49,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2024,4,2]]},"DOI":"10.1080\/24751839.2023.2281143","type":"journal-article","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T12:56:00Z","timestamp":1699966560000},"page":"231-261","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":13,"title":["Lightweight authentication scheme based on Elliptic Curve El Gamal"],"prefix":"10.1080","volume":"8","author":[{"given":"Sondes","family":"Baccouri","sequence":"first","affiliation":[{"name":"Tunisia Polytechnic School, La Marsa, Tunisia"}]},{"given":"Hassene","family":"Farhat","sequence":"additional","affiliation":[{"name":"Tunisian Naval Academy, Menzel Bourguiba, Tunisia"}]},{"given":"Tarek","family":"Azzabi","sequence":"additional","affiliation":[{"name":"Tunisian Naval Academy, Menzel Bourguiba, Tunisia"}]},{"given":"Rabah","family":"Attia","sequence":"additional","affiliation":[{"name":"Tunisia Polytechnic School, La Marsa, Tunisia"}]}],"member":"301","published-online":{"date-parts":[[2023,11,14]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1861-1"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.29322\/IJSRP.9.03.2019.p8779"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC_ASET53395.2022.9765938"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2905899"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07992-x"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4468301"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3756-0"},{"key":"e_1_3_2_9_1","doi-asserted-by":"crossref","unstructured":"Cremers. (2008). The Scyther tool verification falsification and analysis of security protocols. In International conference on computer-aided verification (pp. 414\u2013418). Springer.","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"e_1_3_2_10_1","doi-asserted-by":"crossref","unstructured":"Cremers. (2012). Scyther: Semantics and verification of security protocols. Eindhoven University of Technology.","DOI":"10.1007\/978-3-540-78636-8"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1565-3"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3IOT53935.2022.9768019"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2643546"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2970167"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11142234"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2367312"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20185148"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7540891"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980739"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102443"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1637155"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8876766"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881444"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.02.004"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5771-9"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/C3IT.2015.7060172"},{"issue":"19","key":"e_1_3_2_28_1","first-page":"9053","article-title":"RSA and ECC: A comparative analysis","volume":"12","author":"Mahto D.","year":"2017","unstructured":"Mahto, D., & Yadav, D. K. (2017). RSA and ECC: A comparative analysis. International Journal of Applied Engineering Research, 12(19), 9053\u20139061.","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_3_2_29_1","doi-asserted-by":"crossref","unstructured":"Mallouli F. Hellal A. Saeed N. S. & Alzahrani F. A. (2019). A survey on cryptography: Comparative study between RSA vs ECC algorithms and RSA vs El-Gamal algorithms. In 2019 6th IEEE International conference on cyber security and cloud computing (CSCloud)\/ 2019 5th IEEE international conference on edge computing and scalable cloud (EdgeCom) (pp. 173\u2013176). IEEE.","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00022"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.12988\/ams.2014.49752"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.v33.13"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.92"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-022-02146-y"},{"issue":"2","key":"e_1_3_2_34_1","article-title":"An efficient and secure fingerprint based authentication scheme using elliptic curve cryptography","volume":"19","author":"Panja A.","year":"2022","unstructured":"Panja, A., Mondal, S., Islam, K. A., Ghosh, T. K., & Karforma, S. (2022). An efficient and secure fingerprint based authentication scheme using elliptic curve cryptography. Webology (ISSN: 1735-188X), 19(2). https:\/\/www.webology.org\/.","journal-title":"Webology (ISSN: 1735-188X)"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0194072"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7615-3"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/S11227-020-03318-7"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108460"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102761"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3125"},{"key":"e_1_3_2_41_1","unstructured":"Sridevi R. (2020). Checking user authentication by biometric one time password generation using elliptic curve cryptography."},{"key":"e_1_3_2_42_1","unstructured":"Standards for efficient cryptography group (2000 September). Recommended elliptic curve domain parameters SEC 2."},{"issue":"16","key":"e_1_3_2_43_1","first-page":"4293","article-title":"Comparison of ECC and RSA algorithms in loT devices","volume":"97","author":"Vahdati Z.","year":"2019","unstructured":"Vahdati, Z., Yasin, S., Ghasempour, A., & Salehi, M. (2019). Comparison of ECC and RSA algorithms in loT devices. Journal of Theoretical and Applied Information Technology, 97(16), 4293.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT52294.2021.9573662"},{"key":"e_1_3_2_45_1","unstructured":"William S. (2006). Cryptography and network security-principle and practices elliptic curve cryptography (4th ed. pp. 310\u2013313). PHI Publisher."},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.05.010"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.33736\/jita.3841.2021"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDS52072.2021.00111"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0046-9"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2022.2032602"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2023.2281143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T20:03:23Z","timestamp":1727208203000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2023.2281143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4,2]]}},"alternative-id":["10.1080\/24751839.2023.2281143"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2023.2281143","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-03-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}