{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:19Z","timestamp":1750306279248,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905229","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Research and Analysis of Lightweight Cryptographic Solutions for Internet of Things"],"prefix":"10.1145","author":[{"given":"Isha","family":"Batra","sequence":"first","affiliation":[{"name":"Lovely Professional University, Jalandhar, Punjab"}]},{"given":"Ashish Kr.","family":"Luhach","sequence":"additional","affiliation":[{"name":"Lovely Professional University, Jalandhar, Punjab"}]},{"given":"Nisrag","family":"Pathak","sequence":"additional","affiliation":[{"name":"SVICS, Ahmedabad, Gujarat"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Internet of Things in 2020: A roadmap for the future","author":"Comission European","year":"2008","unstructured":"European Comission , Internet of Things in 2020: A roadmap for the future . 2008 . European Comission, Internet of Things in 2020: A roadmap for the future. 2008."},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations","author":"Parks R.","unstructured":"R. Parks and T. Pennsylvania , \" RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations ,\" pp. 1 -- 24 . R. Parks and T. Pennsylvania, \"RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations,\" pp. 1--24."},{"key":"e_1_3_2_1_3_1","first-page":"678","volume-title":"Conf. Intell. Syst. Knowl. Eng.","author":"Bin Xu B. X.","year":"2010","unstructured":"B. X. Bin Xu , Y. L. Y. Liu , X. H. X. He , and Y. T. Y. Tao , \"On the architecture and address mapping mechanism of IoT,\" 2010 IEEE Int . Conf. Intell. Syst. Knowl. Eng. , pp. 678 -- 682 , 2010 . B. X. Bin Xu, Y. L. Y. Liu, X. H. X. He, and Y. T. Y. Tao, \"On the architecture and address mapping mechanism of IoT,\" 2010 IEEE Int. Conf. Intell. Syst. Knowl. Eng., pp. 678--682, 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"2011 International Conference on. IEEE","author":"Shen B. L.","year":"2011","unstructured":"B. L. Shen , and Guicheng, \" The visions, technologies , applications and security issues of Internet of Things.,\" in .E-Business and E-Government (ICEE) , 2011 International Conference on. IEEE , 2011 . B. L. Shen, and Guicheng, \"The visions, technologies, applications and security issues of Internet of Things.,\" in .E-Business and E-Government (ICEE), 2011 International Conference on. IEEE, 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1985625.1985645"},{"key":"e_1_3_2_1_6_1","volume-title":"Conf. Software, Telecommun. Comput. Networks","author":"Muguira L.","year":"2009","unstructured":"L. Muguira , J. Ruiz-de- Garibay , and J. I. Vazquez , \" Interacting with the digital world through RFID-powered gadgets,\" SoftCOM 2009 - 17th Int . Conf. Software, Telecommun. Comput. Networks , 2009 . L. Muguira, J. Ruiz-de-Garibay, and J. I. Vazquez, \"Interacting with the digital world through RFID-powered gadgets,\" SoftCOM 2009 - 17th Int. Conf. Software, Telecommun. Comput. Networks, 2009."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?","author":"Alcaraz C.","year":"2010","unstructured":"C. Alcaraz , P. Najera , J. Lopez , and R. Roman , \" Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? ,\" 1st Int. Work. Secur. Internet Things , pp. 1 -- 8 , 2010 . C. Alcaraz, P. Najera, J. Lopez, and R. Roman, \"Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?,\" 1st Int. Work. Secur. Internet Things, pp. 1--8, 2010.","journal-title":"1st Int. Work. Secur. Internet Things"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Internet of things. An action plan for Europe","author":"European Commission","year":"2009","unstructured":"European Commission , \" Internet of things. An action plan for Europe ,\" Commun. from Comm. to Eur. Parliam. Counc. Eur. Econ. Soc. Comm. Comm. Reg. , pp. 1 -- 12 , 2009 . European Commission, \"Internet of things. An action plan for Europe,\" Commun. from Comm. to Eur. Parliam. Counc. Eur. Econ. Soc. Comm. Comm. Reg., pp. 1--12, 2009.","journal-title":"Commun. from Comm. to Eur. Parliam. Counc. Eur. Econ. Soc. Comm. Comm. Reg."},{"key":"e_1_3_2_1_11_1","volume-title":"Internet of Things in 2020: A roadmap for the future","author":"Comission European","year":"2008","unstructured":"European Comission , Internet of Things in 2020: A roadmap for the future . 2008 . European Comission, Internet of Things in 2020: A roadmap for the future. 2008."},{"key":"e_1_3_2_1_12_1","volume-title":"Internet of Things: Applications and Challenges in Technology and Standardization","author":"Bandyopadhyay D.","year":"2011","unstructured":"D. Bandyopadhyay and J. Sen , \" Internet of Things: Applications and Challenges in Technology and Standardization ,\" 2011 . D. Bandyopadhyay and J. Sen, \"Internet of Things: Applications and Challenges in Technology and Standardization,\" 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2012.53"},{"key":"e_1_3_2_1_14_1","first-page":"V5","volume-title":"Conf. Adv. Comput. Theory Eng.","author":"Wu M.","year":"2010","unstructured":"M. Wu , T.-J. T. Lu , F.-Y. Ling , J. Sun , and H. Du , \" Research on the architecture of Internet of Things,\" 2010 3rd Int . Conf. Adv. Comput. Theory Eng. , pp. V5 - 484 --V5-487, 2010 . M. Wu, T.-J. T. Lu, F.-Y. Ling, J. Sun, and H. Du, \"Research on the architecture of Internet of Things,\" 2010 3rd Int. Conf. Adv. Comput. Theory Eng., pp. V5-484--V5-487, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"volume-title":"Security Architecture on the Trusting Internet of Things","author":"Zhang B.","key":"e_1_3_2_1_16_1","unstructured":"B. Zhang , X. Ma , and Z. Qin , \" Security Architecture on the Trusting Internet of Things ,\" vol. 9 , no. 4, pp. 364--367, 2011. B. Zhang, X. Ma, and Z. Qin, \"Security Architecture on the Trusting Internet of Things,\" vol. 9, no. 4, pp. 364--367, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9538-x"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Keywords: Table of Contents","author":"Lu C.","year":"2014","unstructured":"C. Lu , \" Overview of Security and Privacy Issues in the Internet of Things Abstract : Keywords: Table of Contents ,\" pp. 1 -- 11 , 2014 . C. Lu, \"Overview of Security and Privacy Issues in the Internet of Things Abstract: Keywords: Table of Contents,\" pp. 1--11, 2014."},{"key":"e_1_3_2_1_20_1","first-page":"374","volume-title":"Mic","author":"Li L.","year":"2012","unstructured":"L. Li , \" Study on Security Architecture in the Internet of Things,\" 2012 Int. Confrence Meas. Inf. Control, no . Mic , pp. 374 -- 377 , 2012 . L. Li, \"Study on Security Architecture in the Internet of Things,\" 2012 Int. Confrence Meas. Inf. Control, no. Mic, pp. 374--377, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Conf. Cyber Confl.","author":"Covington M. J.","year":"2013","unstructured":"M. J. Covington and R. Carskadden , \" Threat Implications of the Internet of Things,\" 2013 5th Int . Conf. Cyber Confl. , pp. 1 -- 12 , 2013 . M. J. Covington and R. Carskadden, \"Threat Implications of the Internet of Things,\" 2013 5th Int. Conf. Cyber Confl., pp. 1--12, 2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_26"},{"key":"e_1_3_2_1_24_1","first-page":"541","article-title":"Exhausting Demirci-Selcuk Meet-in-the-Middle attacks against reduced-round AES","author":"Derbez P.","year":"2014","unstructured":"P. Derbez and P.-A. Fouque , \" Exhausting Demirci-Selcuk Meet-in-the-Middle attacks against reduced-round AES ,\" Fast Softw. Encryption , pp. 541 -- 560 , 2014 . P. Derbez and P.-A. Fouque, \"Exhausting Demirci-Selcuk Meet-in-the-Middle attacks against reduced-round AES,\" Fast Softw. Encryption, pp. 541--560, 2014.","journal-title":"Fast Softw. Encryption"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"},{"volume-title":"HIGHT,\"","author":"Lee J.","key":"e_1_3_2_1_26_1","unstructured":"J. Lee and D. Lim , \" Parallel Architecture for High-Speed Block Cipher , HIGHT,\" vol. 8 , no. 2, pp. 59--66, 2014. J. Lee and D. Lim, \"Parallel Architecture for High-Speed Block Cipher, HIGHT,\" vol. 8, no. 2, pp. 59--66, 2014."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60590-8_29"},{"key":"e_1_3_2_1_28_1","unstructured":"D. J. Needham R.M.; Wheeler \"TEA Extensions; Technical report; University of Cambridge Cambridge United Kingdom \" 1997.  D. J. Needham R.M.; Wheeler \"TEA Extensions; Technical report; University of Cambridge Cambridge United Kingdom \" 1997."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_30_1","unstructured":"\"INTERNATIONAL STANDARD ISO \/ IEC Information technology --- Security techniques --- Lightweight cryptography \" vol. 2012 2012.  \"INTERNATIONAL STANDARD ISO \/ IEC Information technology --- Security techniques --- Lightweight cryptography \" vol. 2012 2012."},{"key":"e_1_3_2_1_31_1","unstructured":"K. Nyberg \"Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities \" 2015.  K. Nyberg \"Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities \" 2015."},{"key":"e_1_3_2_1_32_1","first-page":"86","article-title":"The RC5 encryption algorithm. In Fast Software Encryption","volume":"1008","author":"Rivest R. L.","year":"1995","unstructured":"R. L. Rivest , \" The RC5 encryption algorithm. In Fast Software Encryption ,\" LNCS 1008 , pp. 86 -- 96 , 1995 . R. L. Rivest, \"The RC5 encryption algorithm. In Fast Software Encryption,\" LNCS 1008, pp. 86--96, 1995.","journal-title":"LNCS"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054119"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFOST.2011.6021216"},{"issue":"4","key":"e_1_3_2_1_36_1","first-page":"11","article-title":"File Encryption and Decryption Using Secure RSA","volume":"1","author":"Jamgekar R. S.","year":"2013","unstructured":"R. S. Jamgekar and G. S. Joshi , \" File Encryption and Decryption Using Secure RSA ,\" Int. J. Emerg. Sci. Eng. , vol. 1 , no. 4 , pp. 11 -- 14 , 2013 . R. S. Jamgekar and G. S. Joshi, \"File Encryption and Decryption Using Secure RSA,\" Int. J. Emerg. Sci. Eng., vol. 1, no. 4, pp. 11--14, 2013.","journal-title":"Int. J. Emerg. Sci. Eng."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"key":"e_1_3_2_1_39_1","volume-title":"Work. Secur. Internet Things","author":"Ayuso J.","year":"2010","unstructured":"J. Ayuso , L. Marin , A. Jara , and A. Skarmeta , \" Optimization of Public Key Cryptography (RSA and ECC) for 16-bits Devices based on 6LoWPAN,\" 1st Int . Work. Secur. Internet Things , Tokyo, Japan , 2010 . J. Ayuso, L. Marin, A. Jara, and A. Skarmeta, \"Optimization of Public Key Cryptography (RSA and ECC) for 16-bits Devices based on 6LoWPAN,\" 1st Int. Work. Secur. Internet Things, Tokyo, Japan, 2010."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905229","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":39,"alternative-id":["10.1145\/2905055.2905229","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905229","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}