{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:44Z","timestamp":1750307924115,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,11]],"date-time":"2007-03-11T00:00:00Z","timestamp":1173571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,11]]},"DOI":"10.1145\/1244002.1244256","type":"proceedings-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:31Z","timestamp":1181140651000},"page":"1171-1175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices"],"prefix":"10.1145","author":[{"given":"HongGeun","family":"Kim","sequence":"first","affiliation":[{"name":"Korea Information Security Agency, Korea"}]},{"given":"JungKyu","family":"Han","sequence":"additional","affiliation":[{"name":"Seoul National University, Korea"}]},{"given":"Seongje","family":"Cho","sequence":"additional","affiliation":[{"name":"DanKook University, Korea"}]}],"member":"320","published-online":{"date-parts":[[2007,3,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"B. Schneier Applied Cryptography. John Wiley & Sons 1996.  B. Schneier Applied Cryptography . John Wiley & Sons 1996."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011487018981"},{"key":"e_1_3_2_1_3_1","unstructured":"P. Prasithsangaree and P. Krishnamurthy \"Analysis of energy consumption of rc4 and aes algorithms in wireless lans \" in OLOBECOM 2003 2003.  P. Prasithsangaree and P. Krishnamurthy \"Analysis of energy consumption of rc4 and aes algorithms in wireless lans \" in OLOBECOM 2003 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.29"},{"key":"e_1_3_2_1_5_1","unstructured":"D. S. Wong H. H. Fuentes and A. H. Chan \"The performance measurement of cryptographic primitives on palm devices \" in the 17th Annual Computer Security Applications Conference 2001.   D. S. Wong H. H. Fuentes and A. H. Chan \"The performance measurement of cryptographic primitives on palm devices \" in the 17th Annual Computer Security Applications Conference 2001."},{"key":"e_1_3_2_1_6_1","unstructured":"N. Potlapally \"Optimizing public-key encryption for wireless clients \" in the International Conference on Communications (ICC) 2002.  N. Potlapally \"Optimizing public-key encryption for wireless clients \" in the International Conference on Communications (ICC) 2002."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022241315935"},{"key":"e_1_3_2_1_8_1","unstructured":"N. Ruangchaijatupon and P. Krishnamurthy \"Encryption and power consumption in wireless lans \" in the 3rd IEEEWorkshop on Wireless LANs 2001.  N. Ruangchaijatupon and P. Krishnamurthy \"Encryption and power consumption in wireless lans \" in the 3rd IEEEWorkshop on Wireless LANs 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Fluher I. Mantin and A. Shamir \"Weakness in the key scheduling algorithm of rc4 \" in the Eighth Annual Workshop on Selected Areas in Cryptography 2001.   S. Fluher I. Mantin and A. Shamir \"Weakness in the key scheduling algorithm of rc4 \" in the Eighth Annual Workshop on Selected Areas in Cryptography 2001.","DOI":"10.1007\/3-540-45537-X_1"},{"key":"e_1_3_2_1_10_1","unstructured":"DRM Specification V2.0. Open Mobile Alliance Ltd 2004. DRM Specification V2.0 . Open Mobile Alliance Ltd 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J. Cheng C. N. Chong J. Doumen S. Etalle P. Hartel and S. Nikolaus \"Streamto: Streaming content using a tamper-resistant token \" in the Conf. on Security and Privacy in the Age of Ubiquitous Computing 2005.  J. Cheng C. N. Chong J. Doumen S. Etalle P. Hartel and S. Nikolaus \"Streamto: Streaming content using a tamper-resistant token \" in the Conf. on Security and Privacy in the Age of Ubiquitous Computing 2005.","DOI":"10.1007\/0-387-25660-1_40"}],"event":{"name":"SAC07: The 2007 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Seoul Korea","acronym":"SAC07"},"container-title":["Proceedings of the 2007 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1244002.1244256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1244002.1244256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:42Z","timestamp":1750258302000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1244002.1244256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,11]]},"references-count":11,"alternative-id":["10.1145\/1244002.1244256","10.1145\/1244002"],"URL":"https:\/\/doi.org\/10.1145\/1244002.1244256","relation":{},"subject":[],"published":{"date-parts":[[2007,3,11]]},"assertion":[{"value":"2007-03-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}