{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:46:59Z","timestamp":1762033619395},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tencon.2018.8650067","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T21:10:38Z","timestamp":1552943438000},"page":"0162-0166","source":"Crossref","is-referenced-by-count":2,"title":["Performance Analysis of Encryption Algorithms on Smartwatches"],"prefix":"10.1109","author":[{"given":"Joseph Kyle M.","family":"Centeno","sequence":"first","affiliation":[]},{"given":"Prabhmehar S.","family":"Chhabra","sequence":"additional","affiliation":[]},{"given":"Chynna L.","family":"Fianza","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Montes-Austria","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Ocampo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","journal-title":"How it works &#x2014; Bluetooth Technology Website","key":"ref10"},{"key":"ref11","article-title":"Information security Managing Risk with Defense in Depth","author":"straub","year":"2003","journal-title":"Information Security Reading Room"},{"year":"2004","author":"smart","journal-title":"Cryptography An Introduction","key":"ref12"},{"year":"2013","author":"stallings","journal-title":"Cryptography and Network Security Principles and Practice","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/CCST.2013.6922058"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ISWC.1999.806690"},{"year":"0","journal-title":"Samsung gear s3","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.4108\/cs.1.1.e3"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/634067.634098"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/COMPSAC.2017.96"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2940157.2940161"},{"year":"0","journal-title":"Apple Watch","key":"ref2"},{"year":"2017","journal-title":"Number of connected wearable devices worldwide from 2016 to 2021 (in millions)","key":"ref1"},{"key":"ref9","article-title":"Bluetooth: With Low Energy Comes Low Security","author":"ryan","year":"0","journal-title":"Presented as part of the 7th USENIX Workshop on Offensive Technologies"}],"event":{"name":"TENCON 2018 - 2018 IEEE Region 10 Conference","start":{"date-parts":[[2018,10,28]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2018,10,31]]}},"container-title":["TENCON 2018 - 2018 IEEE Region 10 Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8643125\/8650051\/08650067.pdf?arnumber=8650067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:35:55Z","timestamp":1598247355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8650067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/tencon.2018.8650067","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}