{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:00:31Z","timestamp":1771038031045,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/idaacs.2017.8095259","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T16:03:52Z","timestamp":1511885032000},"page":"1117-1120","source":"Crossref","is-referenced-by-count":3,"title":["Self-reconfigurable cryptographical coprocessor for data streaming encryption in tasks of telemetry and the Internet of Things"],"prefix":"10.1109","author":[{"given":"Heorhii","family":"Vorobets","sequence":"first","affiliation":[]},{"given":"Oleksandr","family":"Vorobets","sequence":"additional","affiliation":[]},{"given":"Valentyna","family":"Horditsa","sequence":"additional","affiliation":[]},{"given":"Volodymyr","family":"Tarasenko","sequence":"additional","affiliation":[]},{"given":"Olha","family":"Vorobets","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"Plug and play integration of hardware security modules"},{"key":"ref11","year":"0","journal-title":"Hardware Security Modules"},{"key":"ref12","year":"0","journal-title":"Data Encryption for Enterprises"},{"key":"ref13","first-page":"1011","author":"sklar","year":"2001","journal-title":"Digital Communications Fundamentals and Applications"},{"key":"ref14","first-page":"784","author":"schneier","year":"1995","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref15","author":"rachwalik","year":"0","journal-title":"Generation of Nonlinear Feedback Shift Registers with Special-purpose Hardware"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2015.7158716"},{"key":"ref17","first-page":"512","article-title":"The evaluation of the linear complexity and the autocorrelation of generalized cyclotomic binary sequences of length 2npm","volume":"9","author":"edemskiy","year":"2015","journal-title":"Mathematical Models and Methods in Applied Sciences"},{"key":"ref4","author":"vermesan","year":"0","journal-title":"Internet of things and cyber-physical systems"},{"key":"ref3","article-title":"Toward Internet of everything: IoT, CPS, and SNSS","author":"sriram","year":"0","journal-title":"Journal of Civil &amp; Environmental Engineering"},{"key":"ref6","year":"0","journal-title":"Apple gadgets can be &#x201C;hacked&#x201D; in one minute"},{"key":"ref5","author":"bondarenko","year":"0","journal-title":"Problems of protection of mobile devices - interception of data"},{"key":"ref8","first-page":"735","article-title":"Cryptography in embedded systems: an overview","author":"wollinger","year":"2003","journal-title":"Proceedings of the Embedded World 2003 Exhibition and Conference Design & Elektronik"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"66","DOI":"10.47839\/ijc.14.2.803","article-title":"Implementation of symmetric cryptography in embedded measurement systems","volume":"14","author":"winiecki","year":"2015","journal-title":"International Journal of Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1515\/jacsm-2016-0002"},{"key":"ref1","article-title":"Proceedings of the Faculty Summit Microsoft Research Asia","author":"chen","year":"0","journal-title":"Internet of Things towards ubiquitous and mobile computing"},{"key":"ref9","first-page":"24","article-title":"Integration of hardware security modules into a deeply embedded TLS stack","volume":"15","author":"kehret","year":"2016","journal-title":"International Journal of Computing"}],"event":{"name":"2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","location":"Bucharest","start":{"date-parts":[[2017,9,21]]},"end":{"date-parts":[[2017,9,23]]}},"container-title":["2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8086093\/8095027\/08095259.pdf?arnumber=8095259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T10:37:35Z","timestamp":1660041455000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8095259\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2017.8095259","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}