{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:23:44Z","timestamp":1759332224823,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/meco.2019.8760043","type":"proceedings-article","created":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T20:10:34Z","timestamp":1563221434000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Modeling the Trade-off Between Security and Performance to Support the Product Life Cycle"],"prefix":"10.1109","author":[{"given":"Radek","family":"Fujdiak","sequence":"first","affiliation":[]},{"given":"Petr","family":"Blazek","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[]},{"given":"Zdenek","family":"Martinasek","sequence":"additional","affiliation":[]},{"given":"Petr","family":"Mlynek","sequence":"additional","affiliation":[]},{"given":"Renaud","family":"Pacalet","sequence":"additional","affiliation":[]},{"given":"David","family":"Smekal","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Mrnustik","sequence":"additional","affiliation":[]},{"given":"Maros","family":"Barabas","sequence":"additional","affiliation":[]},{"given":"Maysam","family":"Zoor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PRIME.2017.7974113"},{"key":"ref32","first-page":"1","article-title":"Parallel bitsliced aes through phast: a single-source high-performance library for multi-cores and gpus","author":"peccerillo","year":"2017","journal-title":"Journal of Cryptographic Engineering"},{"key":"ref31","first-page":"393","article-title":"Optimization of aes and rsa algorithm and its mixed encryption system","author":"liu","year":"2017","journal-title":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASET.2017.7983665"},{"journal-title":"BearSSL A smaller SSL\/TLS Library","year":"2018","author":"pornin","key":"ref34"},{"journal-title":"Multi-concerns interactions system engineering Merge project official website","year":"0","key":"ref10"},{"journal-title":"Architecture-driven multi-concern and seamless assurance and certification of cyber-physical systems Amass h2020 project official website","year":"0","key":"ref11"},{"journal-title":"Automated proof based system and software engineering for real-time applications Assert fp6 project official website","year":"0","key":"ref12"},{"journal-title":"Engineering virtual domain-specific service platforms Idenica fp7 project official website","year":"0","key":"ref13"},{"journal-title":"Aggregated quality assurance for systems Aquas h2020 project official website","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.18.9.2794"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.07.148"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI.2016.7422980"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2015.7382284"},{"journal-title":"Proposals from the erncip thematic group &#x201C;case studies for the cyber-security of industrial automation and control systems&#x201D; for a european iacs components cyber-security compliance and certification scheme","year":"2014","author":"theron","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2716386"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2015.03.055"},{"journal-title":"Crypto++ 5 6 0 Benchmarks","year":"2009","author":"wei","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2016.03.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.58"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54978-1_26"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.8441496"},{"journal-title":"Engineering compass encompas h2020 project official website","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99229-7_14"},{"key":"ref2","article-title":"Additional abcs about plm","author":"gould","year":"2005","journal-title":"Automotive Design and Production"},{"journal-title":"Critical system engineering acceleration Crystal fp7 project official website","year":"0","key":"ref9"},{"key":"ref1","first-page":"1","article-title":"Product lifecycle management","volume":"1","author":"stark","year":"2015","journal-title":"Product lifecycle management"},{"key":"ref20","article-title":"Ics cp\/pe (cyber-to-physical or process effects) case study paper &#x2013; german steel mill cyber attack","author":"lee","year":"2014","journal-title":"Industrial Control Systems SANS ICS 2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"ref21","article-title":"The top 20 cyber attacks against industrial control systems","author":"ginter","year":"2017","journal-title":"Waterfall Security Solution 2017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref23","article-title":"SysML-sec: A sysML environment for the design and development of secure embedded systems","author":"apvrille","year":"2013","journal-title":"APCOSEC 2013 Asia-Pacific Council on Systems Engineering"},{"journal-title":"Cmt Crypto metrics tool","year":"2014","author":"katarzyna","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_13"}],"event":{"name":"2019 8th Mediterranean Conference on Embedded Computing (MECO)","start":{"date-parts":[[2019,6,10]]},"location":"Budva, Montenegro","end":{"date-parts":[[2019,6,14]]}},"container-title":["2019 8th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8752173\/8759882\/08760043.pdf?arnumber=8760043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:19:18Z","timestamp":1657840758000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8760043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/meco.2019.8760043","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}