Open aewag opened 1 week ago
yes
I didnot find DOIs for the following references:
[
{
"key": "ref10",
"article-title": "Implementation of a Hybrid Encryption Scheme for SMS/Multimedia Messages on Android",
"volume": "85",
"author": "el bakry",
"year": "2014",
"journal-title": "International Journal of Computer Applications"
},
{
"key": "ref15",
"first-page": "50",
"article-title": "An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm",
"volume": "2",
"author": "souror",
"year": "2012",
"journal-title": "International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP)"
},
{
"key": "ref4",
"article-title": "Authentication and Encryption of IoT Devices Based on Elliptic Curves: A survey",
"volume": "5",
"author": "takieldeen",
"year": "2021",
"journal-title": "Journal of Intelligent Systems and Internet of Things (JISIoT)"
},
{
"key": "ref3",
"article-title": "Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC",
"volume": "4",
"author": "abarz\u00faa",
"year": "2019",
"journal-title": "IACR Cryptol ePrint Arch"
},
{
"journal-title": "International Conference on Computer and Communication Engineering ICCCE'06 International Islamic University MaIaysia (IIUM)",
"article-title": "Implementing a Proposed Elliptic Curve to Countermeasure Sign Change Fault Attacks and Side Channel Attacks",
"year": "2006",
"author": "el-badway",
"key": "ref5"
},
{
"journal-title": "IEEE The 28th International Conference on Computer Theory and Applications (ICCTA 2018) Egypt",
"article-title": "Modified Elliptic Curve Cryptography in Wireless Sensor Networks Security",
"year": "0",
"author": "bakr",
"key": "ref9"
}
]
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [
{
"authorId": "1977652",
"name": "Rodrigo Abarz\u00faa"
},
{
"authorId": "31634846",
"name": "Claudio Valencia Cordero"
},
{
"authorId": "2322795313",
"name": "Julio L\u00f3pez"
}
],
"doi": null,
"intent": [
"methodology",
"background"
],
"isInfluential": true,
"paperId": "dc8bbcf3abb56f43807846e34060b924d880df46",
"title": "Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC",
"url": "https://www.semanticscholar.org/paper/dc8bbcf3abb56f43807846e34060b924d880df46",
"venue": "IACR Cryptol. ePrint Arch.",
"year": 2019
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "A , \" An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm",
"url": "",
"venue": "In Proceedings of the 5 th Workshop on Embedded Systems Security",
"year": 2010
}
I failed to append the following reference to the review pipeline:
{
"arxivId": null,
"authors": [],
"doi": null,
"intent": [],
"isInfluential": false,
"paperId": "",
"title": "Takieldeen . \u201d Authentication and Encryption of IoT Devices Based on Elliptic Curves : A survey",
"url": "",
"venue": "Journal of Intelligent Systems and Internet of Things ( JISIoT )",
"year": null
}
WDYT? Is this publication in scope?
URL: http://dx.doi.org/10.1109/ITC-Egypt55520.2022.9855769 Google Scholar: https://scholar.google.de/scholar?hl=en&q=10.1109/itc-egypt55520.2022.9855769