{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:11:21Z","timestamp":1776399081449,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T00:00:00Z","timestamp":1574640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cypress Semiconductor","award":["CYP001"],"award-info":[{"award-number":["CYP001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,25]]},"DOI":"10.1145\/3345768.3355924","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T13:19:56Z","timestamp":1574687996000},"page":"61-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Comprehensive Empirical Analysis of TLS Handshake and Record Layer on IoT Platforms"],"prefix":"10.1145","author":[{"given":"Ramzi A.","family":"Nofal","sequence":"first","affiliation":[{"name":"Santa Clara University, Santa Clara, CA, USA"}]},{"given":"Nam","family":"Tran","sequence":"additional","affiliation":[{"name":"Santa Clara University, Santa Clara, CA, USA"}]},{"given":"Carlos","family":"Garcia","sequence":"additional","affiliation":[{"name":"Santa Clara University, Santa Clara, CA, USA"}]},{"given":"Yuhong","family":"Liu","sequence":"additional","affiliation":[{"name":"Santa Clara University, Santa Clara , CA, USA"}]},{"given":"Behnam","family":"Dezfouli","sequence":"additional","affiliation":[{"name":"Santa Clara University, Santa Clara , CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"relaxREWIMO: A real-time and reliable low-power wireless mobile network. ACM Transactions on Sensor Networks (TOSN), 13 (3): 17","author":"Dezfouli Behnam","year":"2017","unstructured":"Behnam Dezfouli , Marjan Radi , and Octav Chipara . relaxREWIMO: A real-time and reliable low-power wireless mobile network. ACM Transactions on Sensor Networks (TOSN), 13 (3): 17 , 2017 . Behnam Dezfouli, Marjan Radi, and Octav Chipara. relaxREWIMO: A real-time and reliable low-power wireless mobile network. ACM Transactions on Sensor Networks (TOSN), 13 (3): 17, 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT.2017.8320166"},{"key":"e_1_3_2_1_3_1","unstructured":"One trillion new iot devices will be produced by 2035. URL https:\/\/learn.arm.com\/route-to-trillion-devices.html.  One trillion new iot devices will be produced by 2035. URL https:\/\/learn.arm.com\/route-to-trillion-devices.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.16"},{"key":"e_1_3_2_1_6_1","unstructured":"URL https:\/\/transparencyreport.google.com\/https\/overview.  URL https:\/\/transparencyreport.google.com\/https\/overview."},{"key":"e_1_3_2_1_7_1","volume-title":"Jun","author":"Finley Klint","year":"2017","unstructured":"Klint Finley . Half the web is now encrypted. that makes everyone safer , Jun 2017 . URL https:\/\/www.wired.com\/2017\/01\/half-web-now-encrypted-makes-everyone-safer\/. Klint Finley. Half the web is now encrypted. that makes everyone safer, Jun 2017. URL https:\/\/www.wired.com\/2017\/01\/half-web-now-encrypted-makes-everyone-safer\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.32"},{"key":"e_1_3_2_1_9_1","volume-title":"The transport layer security (tls) protocol version 1.2","author":"Dierks Tim","year":"2008","unstructured":"Tim Dierks and Eric Rescorla . The transport layer security (tls) protocol version 1.2 . 2008 . Tim Dierks and Eric Rescorla. The transport layer security (tls) protocol version 1.2. 2008."},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Attacks on ssl a comprehensive study of beast, crime, time, breach, lucky 13 and rc4 biases. iSecPartners","author":"Sarkar Fitzgerald Shawn","year":"2013","unstructured":"Fitzgerald Shawn Sarkar , Pratik Guha . Attacks on ssl a comprehensive study of beast, crime, time, breach, lucky 13 and rc4 biases. iSecPartners , pages 1 -- 23 , 2013 . Fitzgerald Shawn Sarkar, Pratik Guha. Attacks on ssl a comprehensive study of beast, crime, time, breach, lucky 13 and rc4 biases. iSecPartners, pages 1--23, 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"relaxElliptic Curve Cryptography","author":"Chen Lily","year":"2017","unstructured":"Lily Chen and Dustin Moody . relaxElliptic Curve Cryptography , 2017 . URL https:\/\/csrc.nist.gov\/Projects\/Elliptic-Curve-Cryptography. Lily Chen and Dustin Moody. relaxElliptic Curve Cryptography, 2017. URL https:\/\/csrc.nist.gov\/Projects\/Elliptic-Curve-Cryptography."},{"key":"e_1_3_2_1_12_1","volume-title":"Aug","author":"Dierks E. Rescorla T.","year":"2008","unstructured":"E. Rescorla T. Dierks . The transport layer security (tls) protocol version 1.2. https:\/\/tools.ietf.org\/html\/rfc5246 , Aug 2008 . E. Rescorla T. Dierks. The transport layer security (tls) protocol version 1.2. https:\/\/tools.ietf.org\/html\/rfc5246, Aug 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2577022"},{"key":"e_1_3_2_1_14_1","volume-title":"relaxCYW943907AEVAL1F Evaluation Kit","author":"Semiconductor Cypress","year":"2018","unstructured":"018 a )]CYW Cypress Semiconductor . relaxCYW943907AEVAL1F Evaluation Kit , 2018 a . URL http:\/\/www.cypress.com\/documentation\/development-kitsboards\/cyw943907aeval1f-evaluation-kit. 018 a )]CYWCypress Semiconductor. relaxCYW943907AEVAL1F Evaluation Kit, 2018 a . URL http:\/\/www.cypress.com\/documentation\/development-kitsboards\/cyw943907aeval1f-evaluation-kit."},{"key":"e_1_3_2_1_15_1","volume-title":"relaxAvnet BCM4343W IoT Starter Kit","author":"018)]BCMAvnet Inc.","year":"2018","unstructured":"018)]BCMAvnet Inc. relaxAvnet BCM4343W IoT Starter Kit , 2018 . URL http:\/\/cloudconnectkits.org\/product\/avnet-bcm4343w-iot-starter-kit. 018)]BCMAvnet Inc. relaxAvnet BCM4343W IoT Starter Kit, 2018. URL http:\/\/cloudconnectkits.org\/product\/avnet-bcm4343w-iot-starter-kit."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.07.016"},{"key":"e_1_3_2_1_17_1","unstructured":"018\n    b )]cypresswicedCypress Semiconductor. relaxWICED Studio Mar 2018 b . URL http:\/\/www.cypress.com\/products\/wiced-software.  018 b )]cypresswicedCypress Semiconductor. relaxWICED Studio Mar 2018 b . URL http:\/\/www.cypress.com\/products\/wiced-software."},{"key":"e_1_3_2_1_18_1","volume-title":"May","author":"Blake-Wilson S.","year":"2006","unstructured":"S. Blake-Wilson , N. Bolyard , V. Gupta , C. Hawk , and B. Moeller . relaxElliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). https:\/\/tools.ietf.org\/html\/rfc4492 , May 2006 . S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. relaxElliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). https:\/\/tools.ietf.org\/html\/rfc4492, May 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.23919\/APSIPA.2018.8659779"},{"issue":"3","key":"e_1_3_2_1_20_1","first-page":"216","article-title":"Evaluating the performance of symmetric encryption algorithms","volume":"10","author":"Abd Elminaam Diaa Salama","year":"2010","unstructured":"Diaa Salama Abd Elminaam , Hatem Mohamed Abdual-Kader , and Mohiy Mohamed Hadhoud . Evaluating the performance of symmetric encryption algorithms . IJ Network Security , 10 ( 3 ): 216 -- 222 , 2010 . Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, and Mohiy Mohamed Hadhoud. Evaluating the performance of symmetric encryption algorithms. IJ Network Security, 10 (3): 216--222, 2010.","journal-title":"IJ Network Security"},{"key":"e_1_3_2_1_21_1","first-page":"9","article-title":"Hardware implementation of aes algorithm","volume":"56","author":"Biasizzo Anton","year":"2005","unstructured":"Anton Biasizzo , Marko Mali , and Frank Novak . Hardware implementation of aes algorithm . Journal of Electrical Engineering , 56 ( 9 -- 10 ): 265--269, 2005 . Anton Biasizzo, Marko Mali, and Frank Novak. Hardware implementation of aes algorithm. Journal of Electrical Engineering, 56 (9--10): 265--269, 2005.","journal-title":"Journal of Electrical Engineering"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.1999.805073"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48390-X_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.105"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.855475"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180366"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.86"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS.2018.8598334"},{"key":"e_1_3_2_1_29_1","volume-title":"Aug","author":"Rescorla E.","year":"2018","unstructured":"E. Rescorla . The transport layer security (tls) protocol version 1.3. https:\/\/tools.ietf.org\/html\/rfc8446 , Aug 2018 . E. Rescorla. The transport layer security (tls) protocol version 1.3. https:\/\/tools.ietf.org\/html\/rfc8446, Aug 2018."}],"event":{"name":"MSWiM '19: 22nd Int'l ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Miami Beach FL USA","acronym":"MSWiM '19","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345768.3355924","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3345768.3355924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:20Z","timestamp":1750202000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345768.3355924"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,25]]},"references-count":29,"alternative-id":["10.1145\/3345768.3355924","10.1145\/3345768"],"URL":"https:\/\/doi.org\/10.1145\/3345768.3355924","relation":{},"subject":[],"published":{"date-parts":[[2019,11,25]]},"assertion":[{"value":"2019-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}