{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:56:19Z","timestamp":1771613779835,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/csnet.2018.8602942","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:10:27Z","timestamp":1546996227000},"page":"1-5","source":"Crossref","is-referenced-by-count":24,"title":["Analysis of Cryptographic Algorithms on IoT Hardware platforms"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"El-Haii","sequence":"first","affiliation":[{"name":"USJ, USAL, Beirut, Lebanon"}]},{"given":"Maroun","family":"Chamoun","sequence":"additional","affiliation":[{"name":"University Saint Joseph (USJ), Beirut, Lebanon"}]},{"given":"Ahmad","family":"Fadlallah","sequence":"additional","affiliation":[{"name":"University of Sciences and Arts in Lebanon (USAL), Beirut, Lebanon"}]},{"given":"Ahmed","family":"Serhrouchni","sequence":"additional","affiliation":[{"name":"Telecom ParisTech Paris, France"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.is.2016.02.004","article-title":"IoT-enabled emergency information supply chain architecture for elderly people: The Australian context","volume":"58","author":"phennel","year":"2016","journal-title":"Information Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.043"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"220","DOI":"10.3390\/s16020220","article-title":"Fingerscanner: Embedding a fingerprint scanner in a raspberry pi","volume":"16","author":"solsona","year":"2016","journal-title":"SENSORS"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.compeleceng.2015.01.019","article-title":"Raspberry Pi as a Sensor Web node for home automation","volume":"44","author":"and maksimovi?","year":"2015","journal-title":"Computers & Electrical Engineering"},{"key":"ref14","first-page":"245","article-title":"Vulnerability testing of wireless access points using unmanned aerial vehicles (uav)","year":"2015","journal-title":"Proceedings of the European Conference on E-learning"},{"key":"ref15","author":"mckay","year":"2017","journal-title":"Toward Standardizing Lightweight Cryptography"},{"key":"ref16","author":"preneel","year":"2002","journal-title":"The NESSIE project towards new cryptographic algorithms"},{"key":"ref17","first-page":"17","article-title":"Finding collisions in the full SHA-1","author":"wang","year":"2005","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref18","first-page":"19","article-title":"How to break MD5 and other hash functions","author":"wang","year":"2005","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3390\/s150921478","article-title":"Optimized ECC implementation for secure communication between heterogeneous IoT devices","volume":"15","author":"marin","year":"2015","journal-title":"SENSORS"},{"key":"ref4","first-page":"303","article-title":"Select this result for bulk action","volume":"1","author":"macii","year":"2005","journal-title":"Journal of Embedded Computing"},{"key":"ref3","article-title":"Forecast: IoT Security, Worldwide, 2018","year":"2018","journal-title":"Gartner Stamford Forecasting G00351051"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.5121\/ijcsit.2017.9508","article-title":"Raspberry Pi and Arduino Uno Working together as a Basic Meteorological Station","volume":"9","author":"mart\u00ednez-gonz\u00e1lez","year":"2017","journal-title":"International Journal of Computer Science and Information Technology"},{"key":"ref5","article-title":"Terminology for constrained-node networks","author":"ersue","year":"2014","journal-title":"Internet Engineering Task Force (IETF) RFC 7228"},{"key":"ref8","first-page":"1","article-title":"Raspberry Pi as Internet of things hardware: performances and constraints","author":"vujovi?","year":"2014","journal-title":"1st International Conference on Electrical Electronic and Computing Engineering IcETRAN"},{"key":"ref7","first-page":"2350","article-title":"A Comparative Study of Arduino, Raspberry Pi and ESP8266 as IoT Development Board","volume":"8","author":"patnaik patnaikuni","year":"2017","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref2","first-page":"968","article-title":"SOA-based Integration of Internet of Things in Enterprise Services","author":"karnouskos","year":"2009","journal-title":"IEEE International Conference on Web Services(ICWS 09)"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A Survey","volume":"54","author":"lera","year":"2010","journal-title":"Computer Networks Journal"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0163-z"}],"event":{"name":"2018 2nd Cyber Security in Networking Conference (CSNet)","location":"Paris, France","start":{"date-parts":[[2018,10,24]]},"end":{"date-parts":[[2018,10,26]]}},"container-title":["2018 2nd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8574117\/8602668\/08602942.pdf?arnumber=8602942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T19:39:04Z","timestamp":1663270744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8602942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/csnet.2018.8602942","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}