{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:29:16Z","timestamp":1767706156281,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/indin.2013.6622965","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T21:49:48Z","timestamp":1382046588000},"page":"676-681","source":"Crossref","is-referenced-by-count":14,"title":["Performance evaluation of MAC algorithms for real-time Ethernet communication systems"],"prefix":"10.1109","author":[{"given":"Bjoern","family":"Czybik","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Hausmann","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Heiss","sequence":"additional","affiliation":[]},{"given":"Jurgen","family":"Jasperneite","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A high speed architecture for galois\/counter mode of operation (gcm)","author":"yang","year":"2005","journal-title":"Cryptology EPrint Archive Report2005\/146"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-68697-5_24","article-title":"On fast and provably secure message authentication based on universal hashing","volume":"1109","author":"shoup","year":"1996","journal-title":"Advances in Cryptology CRYPTO 96 Ser Lecture Notes in Computer Science"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"journal-title":"Federal Information Processing Standards Publication (FIPS 197) Advanced Encryption Standard (AES)","year":"2001","key":"13"},{"year":"0","key":"14"},{"journal-title":"NIST Special Publication 800-38D-Recommendation for Block Cipher Modes of Operation Galois\/Counter Mode (GCM) and GMAC","year":"2007","key":"11"},{"journal-title":"Federal Information Processing Standards Publication (FIPS 180-4) Secure Hash Standard (SHS)","year":"2012","key":"12"},{"journal-title":"Kryptographie und ITSicherheit-Grundlagen und Anwendungen","year":"2008","author":"swoboda","key":"21"},{"journal-title":"PROFIBUS Nutzerorganisation e V","article-title":"PROFINET security guideline, version 1.0","year":"2005","key":"3"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","author":"daemen","year":"2002","journal-title":"The Design of Rijndael Secaucus"},{"key":"2","first-page":"24","article-title":"Industrie 4.0-Alter wein in neuen schlauchen","volume":"12","author":"jasperneite","year":"2012","journal-title":"Computer &Automation (In German)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489651"},{"journal-title":"NIST Special Publication 800-38B-Recommendation for Block Cipher Modes of Operation The CMAC Mode for Authentication","year":"2005","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.61"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1049\/ir:20041105","article-title":"network security - who's responsible? [ethernet in plant floor automation applications]","volume":"50","author":"freeman","year":"2004","journal-title":"IEE Review"},{"year":"0","key":"4"},{"journal-title":"Federal Information Processing Standards Publication (FIPS 198-1) The Keyed-Hash Message Authentication Code (HMAC)","year":"2008","key":"9"},{"key":"8","article-title":"Security in industrial ethernet","author":"peschke","year":"2006","journal-title":"Proc 10th Int IEEE Conf Emerging Technologies and Factory Automation"}],"event":{"name":"2013 IEEE 11th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2013,7,29]]},"location":"Bochum, Germany","end":{"date-parts":[[2013,7,31]]}},"container-title":["2013 11th IEEE International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6599026\/6622844\/06622965.pdf?arnumber=6622965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:06:18Z","timestamp":1498089978000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6622965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/indin.2013.6622965","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}