aewag / physical-attack-collection

0 stars 0 forks source link

Souror_2022 #2869

Open aewag opened 1 week ago

aewag commented 1 week ago

WDYT? Is this publication in scope?

@inproceedings{Souror_2022,
 author = {Souror, Walid W. and Fouad, Mohamed and Takieldeen, Ali E.},
 booktitle = {2022 International Telecommunications Conference (ITC-Egypt)},
 doi = {10.1109/itc-egypt55520.2022.9855769},
 month = {July},
 pages = {1–5},
 publisher = {IEEE},
 title = {Hybrid Security Enhancement of ECC with Side Channel And Sign Fault Attack Countermeasures},
 url = {http://dx.doi.org/10.1109/ITC-Egypt55520.2022.9855769},
 year = {2022}
}

URL: http://dx.doi.org/10.1109/ITC-Egypt55520.2022.9855769 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1109/itc-egypt55520.2022.9855769

aewag commented 1 week ago

yes

aewag commented 1 week ago

I didnot find DOIs for the following references:

[
    {
        "key": "ref10",
        "article-title": "Implementation of a Hybrid Encryption Scheme for SMS/Multimedia Messages on Android",
        "volume": "85",
        "author": "el bakry",
        "year": "2014",
        "journal-title": "International Journal of Computer Applications"
    },
    {
        "key": "ref15",
        "first-page": "50",
        "article-title": "An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm",
        "volume": "2",
        "author": "souror",
        "year": "2012",
        "journal-title": "International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP)"
    },
    {
        "key": "ref4",
        "article-title": "Authentication and Encryption of IoT Devices Based on Elliptic Curves: A survey",
        "volume": "5",
        "author": "takieldeen",
        "year": "2021",
        "journal-title": "Journal of Intelligent Systems and Internet of Things (JISIoT)"
    },
    {
        "key": "ref3",
        "article-title": "Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC",
        "volume": "4",
        "author": "abarz\u00faa",
        "year": "2019",
        "journal-title": "IACR Cryptol ePrint Arch"
    },
    {
        "journal-title": "International Conference on Computer and Communication Engineering ICCCE'06 International Islamic University MaIaysia (IIUM)",
        "article-title": "Implementing a Proposed Elliptic Curve to Countermeasure Sign Change Fault Attacks and Side Channel Attacks",
        "year": "2006",
        "author": "el-badway",
        "key": "ref5"
    },
    {
        "journal-title": "IEEE The 28th International Conference on Computer Theory and Applications (ICCTA 2018) Egypt",
        "article-title": "Modified Elliptic Curve Cryptography in Wireless Sensor Networks Security",
        "year": "0",
        "author": "bakr",
        "key": "ref9"
    }
]

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [
        {
            "authorId": "1977652",
            "name": "Rodrigo Abarz\u00faa"
        },
        {
            "authorId": "31634846",
            "name": "Claudio Valencia Cordero"
        },
        {
            "authorId": "2322795313",
            "name": "Julio L\u00f3pez"
        }
    ],
    "doi": null,
    "intent": [
        "methodology",
        "background"
    ],
    "isInfluential": true,
    "paperId": "dc8bbcf3abb56f43807846e34060b924d880df46",
    "title": "Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC",
    "url": "https://www.semanticscholar.org/paper/dc8bbcf3abb56f43807846e34060b924d880df46",
    "venue": "IACR Cryptol. ePrint Arch.",
    "year": 2019
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "A , \" An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm",
    "url": "",
    "venue": "In Proceedings of the 5 th Workshop on Embedded Systems Security",
    "year": 2010
}

I failed to append the following reference to the review pipeline:

{
    "arxivId": null,
    "authors": [],
    "doi": null,
    "intent": [],
    "isInfluential": false,
    "paperId": "",
    "title": "Takieldeen . \u201d Authentication and Encryption of IoT Devices Based on Elliptic Curves : A survey",
    "url": "",
    "venue": "Journal of Intelligent Systems and Internet of Things ( JISIoT )",
    "year": null
}