{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:43:41Z","timestamp":1755693821521},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T00:00:00Z","timestamp":1367366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/tce.2013.6531115","type":"journal-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T17:25:43Z","timestamp":1372267543000},"page":"335-342","source":"Crossref","is-referenced-by-count":11,"title":["Overhead of using secure wireless communications in mobile computing"],"prefix":"10.1109","volume":"59","author":[{"given":"Florina","family":"Almenares","sequence":"first","affiliation":[]},{"given":"Patricia","family":"Arias","sequence":"additional","affiliation":[]},{"given":"Andres","family":"Marin","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Diaz-Sanchez","sequence":"additional","affiliation":[]},{"given":"Rosa","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The Energy Cost of SSL in Deeply Embedded Systems","author":"gupta","year":"2008","journal-title":"Sun Tech Rep"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644927"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2013.6486865"},{"key":"ref13","article-title":"Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)","author":"blake-wilson","year":"2006","journal-title":"IETF Tech Rep RFC 4492 Network WG"},{"key":"ref14","article-title":"Browser Security Handbook","year":"2011","journal-title":"A Research Project Report"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00045"},{"key":"ref16","first-page":"800","article-title":"Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations","author":"chernick","year":"2005","journal-title":"NIST Special Publication"},{"key":"ref17","article-title":"JSR 177: Security and Trust Services API for J2ME","year":"2007","journal-title":"Java Community Process (JCP)"},{"key":"ref18","first-page":"sp800","article-title":"Recommendation for Key Management, Part 1: General","author":"barker","year":"2012","journal-title":"NIST Tech Rep"},{"key":"ref19","article-title":"Yearly Report on Algorithms and Key sizes (2011&#x2013;2012)","author":"smart","year":"2012","journal-title":"Project Tech Rep D SPA 20 Rev 1 0 ICT-2007&#x2013;216676 ECRYPT II"},{"key":"ref4","article-title":"HTTP over TLS","author":"rescorla","year":"2000","journal-title":"IETF Tech Rep RFC 2818"},{"key":"ref3","article-title":"The Transport Layer Security (TLS) Protocol, Version 1.2","author":"dierks","year":"2008","journal-title":"IETF Tech Rep RFC 5246"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1959","DOI":"10.1109\/TCE.2009.5373756","article-title":"Design and implementation of an ASIC-based sensor device for WSN applications","volume":"55","author":"shilong","year":"2009","journal-title":"IEEE Trans Consumer Electron"},{"key":"ref5","article-title":"Using TLS with IMAP, POP3, and ACAP","author":"newman","year":"1999","journal-title":"IETF Tech Rep RFC 2595"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/fi3010031"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2010.5439136"},{"key":"ref2","article-title":"Mobile Web Watch Survey 2012: Mobile Internet &#x2013;&#x2013;Spawning New Growth Opportunities in the Convergence Area","year":"2012","journal-title":"Rep"},{"key":"ref1","article-title":"The Growth of Mobile Marketing and Tagging","author":"richmond","year":"2011","journal-title":"Microsoft Tag Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.16"},{"key":"ref20","article-title":"Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","author":"cooper","year":"2008","journal-title":"IETF Tech Rep RFC 5280"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/30\/6531103\/06531115.pdf?arnumber=6531115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:02:00Z","timestamp":1642003320000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6531115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":20,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tce.2013.6531115","relation":{},"ISSN":["0098-3063"],"issn-type":[{"value":"0098-3063","type":"print"}],"subject":[],"published":{"date-parts":[[2013,5]]}}}