{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:13:07Z","timestamp":1730279587046,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwcmc.2017.7986481","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T20:38:06Z","timestamp":1500583086000},"page":"1350-1355","source":"Crossref","is-referenced-by-count":2,"title":["Energy consumption comparison for mobile video streaming encryption algorithm"],"prefix":"10.1109","author":[{"given":"Nouha","family":"Samet","sequence":"first","affiliation":[]},{"given":"Asma","family":"Ben Letaifa","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hamdi","sequence":"additional","affiliation":[]},{"given":"Sami","family":"Tabbane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Recommendation for the triple data encryption algorithm (TDEA) block cipher","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04101-3_2"},{"key":"ref10","first-page":"57","article-title":"Power Awareness Experiment for Crypto Service-Based Algorithms","volume":"101","author":"toldinas","year":"2015","journal-title":"Elektronoka Elektrotechnika"},{"journal-title":"The Blowfish encryption algorithm","year":"0","author":"schneier","key":"ref6"},{"key":"ref11","article-title":"A Comparative Survey on Symmetric Key Encryption Techniques","volume":"4","author":"agrawal","year":"2012","journal-title":"ResearchGATE"},{"journal-title":"Advanced Encryption Standard (AES)","year":"0","key":"ref5"},{"journal-title":"Prohibiting RC4 Cipher Suites","year":"0","key":"ref12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2013.6496385"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2015.7298334"},{"key":"ref2","article-title":"NIST SP 800&#x2013;56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography","author":"barker","year":"2009","journal-title":"National Institute of Standards & Technology"},{"journal-title":"Performance Evaluation Of New Hybrid Encryption Algorithms To Be Used For Mobile Cloud Computing","year":"0","key":"ref9"},{"journal-title":"White Paper Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update","year":"0","key":"ref1"}],"event":{"name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2017,6,26]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7975134\/7986245\/07986481.pdf?arnumber=7986481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:41:09Z","timestamp":1502898069000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7986481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2017.7986481","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}