{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:05:17Z","timestamp":1766066717995,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/aiccsa.2016.7945813","type":"proceedings-article","created":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T20:44:49Z","timestamp":1497300289000},"page":"1-6","source":"Crossref","is-referenced-by-count":26,"title":["More secure Internet of Things using robust encryption algorithms against side channel attacks"],"prefix":"10.1109","author":[{"given":"Lo'ai A.","family":"Tawalbeh","sequence":"first","affiliation":[]},{"given":"Turki F.","family":"Somani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Improved Method and Apparatus for Protecting Public Key Schemes from Timing and Fault Attacks","year":"1998","author":"shamir","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_31"},{"key":"ref31","first-page":"101","article-title":"On the Importance of Checking Cryptographic Protocols for Faults","volume":"12","author":"boneh","year":"1997","journal-title":"International Association for Cryptologic Research-Journal of Cryptology"},{"key":"ref30","article-title":"A practical countermeasure against address-bit differential power analysis","author":"itoh","year":"2003","journal-title":"Proceedings of CHES'03 Berlin"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-009-0376-x"},{"journal-title":"Book title Security and Privacy in Cyber-Physical Systems Foundations and Applications (Wiley Publisher) Editors","year":"2016","author":"tawalbeh","key":"ref11"},{"key":"ref12","article-title":"Trust Delegation based Secure Mobile Cloud Computing Framework","volume":"8","author":"tawalbeh","year":"2016","journal-title":"International Journal of Information and Computer Security"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1007\/s11036-016-0756-y","volume":"21","author":"benkhelifa","year":"2016","journal-title":"Mobile Networks and Applications"},{"key":"ref14","first-page":"167","volume":"6","author":"tawalbeh","year":"2011","journal-title":"Journal of Information Assurance and Security"},{"key":"ref15","first-page":"3411","article-title":"Key IOT Technology and Application Research","volume":"543","author":"xu","year":"2014","journal-title":"Applied Mechanics and Materials"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref17","article-title":"Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved","author":"mohammad","year":"2014","journal-title":"2014 11th International Bhurban Conference on Applied Sciences and Technology (IBCAST)"},{"key":"ref18","article-title":"Hardware Implementations of Secure Hashing Functions on FPGAs for WSNs","author":"moh'd","year":"2010","journal-title":"Proceedings of the 3rd International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.48"},{"key":"ref28","article-title":"RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis","author":"yen","year":"2001","journal-title":"International Conference on Information Security and Cryptology -ICISC 2001"},{"key":"ref4","article-title":"A Review on Internet of Things (loT)","volume":"113 1","author":"farooq","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"ref27","first-page":"292","article-title":"Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems","volume":"1717","author":"coron","year":"2002","journal-title":"Proc First International Workshop CHES'99 Worcester"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.10.01.70-76"},{"key":"ref6","first-page":"1983","article-title":"Application models of IOT","volume":"416","author":"xiao hui","year":"2013","journal-title":"Applied Mechanics and Materials"},{"key":"ref29","article-title":"A New CRT-RSA Algorithm Secure against Bellcore Attacks","author":"blomer","year":"2003","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"ref5","first-page":"97","article-title":"That 'internet of things' thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0147"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.techfore.2013.08.041","article-title":"A strategic view on smart city technology: The case of IBM Smarter Cities during a recession","volume":"89","author":"sotirios","year":"2014","journal-title":"Technological Forecasting and Social Change"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1016\/j.procs.2015.05.150","article-title":"A Secure Cloud Computing Model based on Data Classification","volume":"52","author":"tawalbeh","year":"2015","journal-title":"6th ANT conference Procedia Computer Science"},{"key":"ref9","first-page":"284","article-title":"An Integrated Radix-4 Modular Divider\/Multiplier Hardware Architecture for Cryptographic Applications","volume":"9","author":"tawalbeh","year":"2012","journal-title":"The International Arab Journal of Information Technology"},{"key":"ref1","article-title":"Handbook of Wireless Security: From Specifications to Implementations","author":"sklavos","year":"2007","journal-title":"CRC- Press ATaylor and Francis Group ISBN X 84938771 (2007)"},{"key":"ref20","article-title":"Short Paper: IoT: Challenges, projects, architectures","author":"vangelis","year":"0","journal-title":"Intelligence in Next Generation Networks (ICIN) 2015 18th International Conference on IEEE"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ECONF.2015.59"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIT.2014.6894411"},{"key":"ref24","first-page":"104","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","author":"kocher","year":"1996","journal-title":"Proc Crypto 1 Santa Barbara"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1080\/19393555.2010.499799","volume":"19","author":"tawalbeh","year":"2010","journal-title":"International Journal of Information Security A global Perspective"},{"key":"ref26","first-page":"377","article-title":"Protections against Differential Analysis for Elliptic Curve Cryptography","volume":"2162","author":"joye","year":"2001","journal-title":"Proc Third Int l Workshop"},{"key":"ref25","article-title":"Exact analysis of Montgomery multiplication","author":"sato","year":"2004","journal-title":"Proc of INDOCRYPT'04 LNCS Berlin"}],"event":{"name":"2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2016,11,29]]},"location":"Agadir, Morocco","end":{"date-parts":[[2016,12,2]]}},"container-title":["2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7937763\/7945610\/07945813.pdf?arnumber=7945813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T23:33:37Z","timestamp":1569454417000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7945813\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2016.7945813","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}