{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:36Z","timestamp":1738777236279,"version":"3.37.0"},"reference-count":6,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.11.2943-2950","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T01:56:03Z","timestamp":1414979763000},"source":"Crossref","is-referenced-by-count":0,"title":["Elliptic curve cryptography for WSN and SPA attacks method for energy evaluation"],"prefix":"10.4304","volume":"9","author":[{"given":"Nabil","family":"GHANMY","sequence":"first","affiliation":[]},{"given":"Lamia","family":"CHAARI FOURATI","sequence":"additional","affiliation":[]},{"given":"Lotfi","family":"KAMOUN","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[1969,12,31]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-28632-5_9","article-title":"Comparing elliptic curve cryptography and rsa on 8-bit cpus","volume-title":"6th International Workshop on Cryptographic Hardware and Embedded Systems","author":"Gura","year":"2004","unstructured":"[7] N. Gura, A. Patel, A. Wander, H. Eberle, and S.-C. Shantz, \"Comparing elliptic curve cryptography and rsa on 8-bit cpus,\" in 6th International Workshop on Cryptographic Hardware and Embedded Systems, August 2004."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.76"},{"volume-title":"J Lopez and J Zhou Wireless Sensor Network Security","year":"2008","key":"ref3","unstructured":"[30] J. Lopez and J. Zhou, Wireless Sensor Network Security. IOS Press, 2008."},{"key":"ref4","article-title":"Security protocols for sensor networks","volume-title":"7th Annual International Conference on Mobile Computing and Networking","author":"Perrig","year":"2001","unstructured":"[33] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.-D. Tygar, \"Security protocols for sensor networks,\" in 7th Annual International Conference on Mobile Computing and Networking, 2001."},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/1626195.1626258","article-title":"Pushing the limits of one-time signatures","volume-title":"International Conference on Security of Information and Networks","author":"Bicakci","year":"2009","unstructured":"[34] K. Bicakci, \"Pushing the limits of one-time signatures,\" in International Conference on Security of Information and Networks, 2009."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31662-3_11"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:30Z","timestamp":1738775310000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1969,12,31]]},"references-count":6,"journal-issue":{"issue":"11","published-online":{"date-parts":[[1969,12,31]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.11.2943-2950","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[1969,12,31]]}}}