{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:19:06Z","timestamp":1771298346025,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/kse.2019.8919479","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T05:26:17Z","timestamp":1575609977000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["End to end message encryption using Poly1305 and XSalsa20 in Low power and Lossy Networks"],"prefix":"10.1109","author":[{"given":"Sonxay","family":"Luangoudom","sequence":"first","affiliation":[]},{"given":"Tuyen","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Duc","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Linh Giang","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Using advanced encryption standard (aes) counter mode with ipsec encapsulating security payload (esp)","author":"housley","year":"2004","journal-title":"Technical Report"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITECHN.2017.8281857"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SaCoNeT.2018.8585451"},{"key":"ref13","article-title":"RFC 7539: ChaCha20 and Poly1305 for IETF Protocols","author":"nir","year":"2015"},{"key":"ref14","first-page":"95","article-title":"Authenticated Encryption for Wireless Sensor Network","volume":"2","author":"padmini","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440950"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/sec.406"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.55"},{"key":"ref18","article-title":"Performance Evaluation of Cryptographic Ciphers on IoT Devices","author":"singh","year":"2018","journal-title":"Technical Report"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.01.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_3"},{"key":"ref6","first-page":"1","article-title":"Performance evaluation of end-to-end security protocols in an internet of things","author":"de rubertis","year":"0","journal-title":"Technical Report"},{"key":"ref5","author":"bernstein","year":"2011","journal-title":"The security impact of a new cryptographic library"},{"key":"ref8","article-title":"The contiki os: The operating system for the internet of things","volume":"605","author":"dunkels","year":"2011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927078"},{"key":"ref2","article-title":"Extending the Salsa20 nonce","author":"bernstein","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.23"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.31449\/inf.v42i3.2245"},{"key":"ref22","article-title":"RPL: IPv6 routing protocol for low-power and lossy networks","author":"winter","year":"2012","journal-title":"Technical Report"},{"key":"ref21","first-page":"1333","article-title":"DTLS performance in duty-cycled networks","author":"vu?ini?","year":"2015","journal-title":"2015 IEEE 26th Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC)"}],"event":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","location":"Da Nang, Vietnam","start":{"date-parts":[[2019,10,24]]},"end":{"date-parts":[[2019,10,26]]}},"container-title":["2019 11th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8909968\/8919259\/08919479.pdf?arnumber=8919479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:18:08Z","timestamp":1657840688000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8919479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/kse.2019.8919479","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}