{"id":"https://openalex.org/W2087604997","doi":"https://doi.org/10.1109/icc.2014.6883586","title":"Characterizing the impact of dynamic resource management on message authentication in mobiles","display_name":"Characterizing the impact of dynamic resource management on message authentication in mobiles","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2087604997","doi":"https://doi.org/10.1109/icc.2014.6883586","mag":"2087604997"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2014.6883586","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883586","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103242740","display_name":"Abdulmonem M. Rashwan","orcid":"https://orcid.org/0000-0002-9105-7533"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"A. M. Rashwan","raw_affiliation_strings":["Telecommunications Research Lab, Queen's University, Kingston, ON, Canada","Telecommun. Res. Lab., Queen's Univ., Kingston, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Telecommunications Research Lab, Queen's University, Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]},{"raw_affiliation_string":"Telecommun. Res. Lab., Queen's Univ., Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024897640","display_name":"A-E M. Taha","orcid":null},"institutions":[{"id":"https://openalex.org/I134359838","display_name":"Alfaisal University","ror":"https://ror.org/00cdrtq48","country_code":"SA","type":"education","lineage":["https://openalex.org/I134359838"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"A-E M. Taha","raw_affiliation_strings":["Electrical Engineering Department, Alfaisal University, Riyadh, KSA","Electr. Eng. Dept., Alfaisal Univ., Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Alfaisal University, Riyadh, KSA","institution_ids":["https://openalex.org/I134359838"]},{"raw_affiliation_string":"Electr. Eng. Dept., Alfaisal Univ., Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I134359838"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021196543","display_name":"Hossam S. Hassanein","orcid":"https://orcid.org/0000-0003-0260-8979"},"institutions":[{"id":"https://openalex.org/I204722609","display_name":"Queen's University","ror":"https://ror.org/02y72wh86","country_code":"CA","type":"education","lineage":["https://openalex.org/I204722609"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"H. S. Hassanein","raw_affiliation_strings":["Telecommunications Research Lab, Queen's University, Kingston, ON, Canada","Telecommun. Res. Lab., Queen's Univ., Kingston, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Telecommunications Research Lab, Queen's University, Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]},{"raw_affiliation_string":"Telecommun. Res. Lab., Queen's Univ., Kingston, ON, Canada","institution_ids":["https://openalex.org/I204722609"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103242740"],"corresponding_institution_ids":["https://openalex.org/I204722609"],"apc_list":null,"apc_paid":null,"fwci":0.7889,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82459542,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5000","issue":null,"first_page":"1813","last_page":"1818"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8004437685012817},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5944098234176636},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5706925988197327},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5347259044647217},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5000488758087158},{"id":"https://openalex.org/keywords/jitter","display_name":"Jitter","score":0.48437294363975525},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46949127316474915},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.45444995164871216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4348001480102539},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4334195554256439},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.4170111119747162},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.41216155886650085},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40428441762924194},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.20117661356925964},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11555179953575134}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8004437685012817},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5944098234176636},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5706925988197327},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5347259044647217},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5000488758087158},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.48437294363975525},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46949127316474915},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.45444995164871216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4348001480102539},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4334195554256439},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.4170111119747162},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.41216155886650085},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40428441762924194},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.20117661356925964},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11555179953575134},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2014.6883586","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883586","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W159725882","https://openalex.org/W1511189048","https://openalex.org/W1926238639","https://openalex.org/W2006335449","https://openalex.org/W2023133101","https://openalex.org/W2155644445","https://openalex.org/W2158307590"],"related_works":["https://openalex.org/W2121182846","https://openalex.org/W2315668284","https://openalex.org/W2155789024","https://openalex.org/W3213608175","https://openalex.org/W4210272022","https://openalex.org/W1844259124","https://openalex.org/W1974440652","https://openalex.org/W1541175715","https://openalex.org/W565993663","https://openalex.org/W2326504464"],"abstract_inverted_index":{"Communication":[0],"security":[1,106],"measures":[2,13],"are":[3,67],"becoming":[4],"prominent":[5],"standards":[6],"of":[7,46,55,91],"next":[8],"generation":[9],"mobile":[10,62,79],"networks.":[11],"These":[12],"usually":[14],"involve":[15],"resource-intensive":[16],"cryptographic":[17,92],"operations":[18,48],"that":[19],"can":[20],"greatly":[21],"affect":[22],"communication":[23,51],"performance,":[24],"particularly":[25],"when":[26],"it":[27],"comes":[28],"to":[29,41],"time-based":[30],"guarantees":[31],"such":[32,47],"as":[33,64],"delay":[34],"and":[35,73,84,98],"jitter.":[36],"It":[37],"this":[38],"becomes":[39],"vital":[40],"understand":[42],"the":[43,89,100],"computational":[44,65],"characteristics":[45],"from":[49],"a":[50],"perspective.":[52],"The":[53],"determination":[54],"these":[56],"characteristics,":[57],"however,":[58],"is":[59],"challenging":[60],"with":[61],"computing":[63,80],"resources":[66],"dynamically":[68],"managed":[69],"for":[70,103],"balanced":[71],"performance":[72],"energy-efficiency.":[74],"This":[75],"paper":[76],"investigates":[77],"different":[78],"resource":[81],"management":[82],"features,":[83],"evaluates":[85],"their":[86],"impact":[87],"on":[88,99],"evaluation":[90],"functions":[93],"used":[94],"in":[95],"message":[96],"authentication,":[97],"design":[101],"considerations":[102],"future":[104],"context-aware":[105],"protocols.":[107]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
