{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:18:00Z","timestamp":1767705480484},"reference-count":4,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,7]]},"DOI":"10.1109\/meditcom49071.2021.9647500","type":"proceedings-article","created":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T23:06:03Z","timestamp":1640300763000},"page":"61-64","source":"Crossref","is-referenced-by-count":2,"title":["Securitization of cloud, edge and IoT communications through hardware accelerations\/offloadings"],"prefix":"10.1109","author":[{"given":"Boris","family":"Pismenny","sequence":"first","affiliation":[]},{"given":"J. J. Vegas","family":"Olmos","sequence":"additional","affiliation":[]},{"given":"Yoray","family":"Zack","sequence":"additional","affiliation":[]},{"given":"Liran","family":"Liss","sequence":"additional","affiliation":[]},{"given":"Afra","family":"Domeke","sequence":"additional","affiliation":[]},{"given":"Catalina Ioana","family":"Stan","sequence":"additional","affiliation":[]},{"given":"Carlos Rubio","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Idelfonso Tafur","family":"Monroy","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Kokkinos","sequence":"additional","affiliation":[]},{"given":"Aristotelis","family":"Kretsis","sequence":"additional","affiliation":[]},{"given":"Manos","family":"Varvarigos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446732"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2019.8917899"},{"year":"0","key":"ref2","article-title":"National Institute of Standards and Technology"},{"key":"ref1","article-title":"Efficient implementationof the AES algorithm for security applications","author":"soliman","year":"2017","journal-title":"IEEE International System-on-Chip Conference"}],"event":{"name":"2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)","start":{"date-parts":[[2021,9,7]]},"location":"Athens, Greece","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647430\/9647442\/09647500.pdf?arnumber=9647500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:44Z","timestamp":1652201984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647500\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":4,"URL":"https:\/\/doi.org\/10.1109\/meditcom49071.2021.9647500","relation":{},"subject":[],"published":{"date-parts":[[2021,9,7]]}}}