{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:17Z","timestamp":1750308437445,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372955","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Cryptography in e-Health using 5G based IOT"],"prefix":"10.1145","author":[{"given":"Rougaii","family":"Fatima","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Telecommunication Systems, National School of Applied Sciences, Kenitra, MOROCCO"}]},{"given":"Rayyam","family":"Manal","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Telecommunication Systems, National School of Applied Sciences, Kenitra, MOROCCO"}]},{"given":"Mazri","family":"Tomader","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Telecommunication Systems, National School of Applied Sciences, Kenitra, MOROCCO"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ning H and Wang B 2008 RFID major projects and the state Internet of Things. Mechanical Industry Press  Ning H and Wang B 2008 RFID major projects and the state Internet of Things. Mechanical Industry Press"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Bhoyar P. Sahare P. Dhok S. B. & Deshmukh R. B? 2018. Communication Technologies and Security Challenges for Internet of Things: A Comprehensive Review AEU - International Journal of Electronics and Communications.  Bhoyar P. Sahare P. Dhok S. B. & Deshmukh R. B? 2018. Communication Technologies and Security Challenges for Internet of Things: A Comprehensive Review AEU - International Journal of Electronics and Communications.","DOI":"10.1016\/j.aeue.2018.11.031"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"e_1_3_2_1_5_1","volume-title":"Nokia, Espoo","author":"Nokia","year":"2017","unstructured":"Nokia , Lte evolution for iot connectivity , Nokia, Espoo , Finland , White Paper ( 2017 ). Nokia, Lte evolution for iot connectivity, Nokia, Espoo, Finland, White Paper (2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"C. Bhatt N. Dey A. S. Ashour Internet of things and big data technologies for next generation healthcare.  C. Bhatt N. Dey A. S. Ashour Internet of things and big data technologies for next generation healthcare."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Huo Y. & Liu D 2017. High-Throughput Area-Efficient Processor for Cryptography. Chinese Journal of Electronics.  Huo Y. & Liu D 2017. High-Throughput Area-Efficient Processor for Cryptography. Chinese Journal of Electronics.","DOI":"10.1109\/ASAP.2017.7995285"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"e_1_3_2_1_10_1","unstructured":"S. Khan J. Abdullah N. Khan AA Julahi S Tarmizi \" 2017. Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks\" IJCSNS International Journal of Computer Science and Network Security.  S. Khan J. Abdullah N. Khan AA Julahi S Tarmizi \" 2017. Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks\" IJCSNS International Journal of Computer Science and Network Security."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3025"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"P. Bhatia and R. Sumbaly 2014. \"FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY \".  P. Bhatia and R. Sumbaly 2014. \"FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY \".","DOI":"10.5121\/ijcnc.2014.6604"},{"key":"e_1_3_2_1_13_1","unstructured":"F. Sufyan \"Defeating Man-in-the-Middle Attack in Quantum Key Distribution \".  F. Sufyan \"Defeating Man-in-the-Middle Attack in Quantum Key Distribution \"."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Zhong H. Zhao R. Cui J. Jiang X. & Gao J 2016. An Improved ECDSA Scheme for Wireless Sensor Network. International Journal of Future Generation Communication and Networking.  Zhong H. Zhao R. Cui J. Jiang X. & Gao J 2016. An Improved ECDSA Scheme for Wireless Sensor Network. International Journal of Future Generation Communication and Networking.","DOI":"10.14257\/ijfgcn.2016.9.2.08"},{"key":"e_1_3_2_1_15_1","volume-title":"PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier P., Verbauwhede I. (eds) Cryptographic Hardware and Embedded Systems - CHES","author":"Bogdanov A.","year":"2007","unstructured":"Bogdanov A. , 2007 . PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier P., Verbauwhede I. (eds) Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol 4727. Springer , Berlin, Heidelberg Bogdanov A. et al., 2007. PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier P., Verbauwhede I. (eds) Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science, vol 4727. Springer, Berlin, Heidelberg"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Dimitris Schinianakis 2017. \"alternative security options in the 5G and IOT era\". IEEE Circuits and Systems Magazine.  Dimitris Schinianakis 2017. \"alternative security options in the 5G and IOT era\". IEEE Circuits and Systems Magazine.","DOI":"10.1109\/MCAS.2017.2757080"},{"key":"e_1_3_2_1_17_1","unstructured":"National Institute of Standards and Technology. SP800-38A: Recommendation for block cipher modes of operation.  National Institute of Standards and Technology. SP800-38A: Recommendation for block cipher modes of operation."},{"key":"e_1_3_2_1_18_1","unstructured":"F. Barbabella M. Gabriella Melchiorre S. Quattrini R. Papa G. Lamura. 2017.How can eHealth improve care for people with multimorbidity in Europe? European Observatory on Health Policies and Systems.  F. Barbabella M. Gabriella Melchiorre S. Quattrini R. Papa G. Lamura. 2017.How can eHealth improve care for people with multimorbidity in Europe? European Observatory on Health Policies and Systems."},{"key":"e_1_3_2_1_19_1","volume-title":"Cryptography and Communications","author":"Elena Dubrova","year":"2015","unstructured":"Elena Dubrova , Martin Hell, Espresso : \" A stream cipher for 5G wireless communication systems \". Cryptography and Communications , 2015 Elena Dubrova, Martin Hell, Espresso: \"A stream cipher for 5G wireless communication systems\". Cryptography and Communications, 2015"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"S. Deb B. Bhuyan 2018. Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices ICT Express.  S. Deb B. Bhuyan 2018. Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices ICT Express.","DOI":"10.1016\/j.icte.2018.01.005"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372955","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372955"}},"subtitle":["A comparison study"],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":20,"alternative-id":["10.1145\/3372938.3372955","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372955","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}