{"id":"https://openalex.org/W2943188976","doi":"https://doi.org/10.1109/icm.2018.8704025","title":"A study of Authentication Encryption Algorithms (POET, Deoxys, AEZ, MORUS, ACORN, AEGIS, AES-GCM) For Automotive Security","display_name":"A study of Authentication Encryption Algorithms (POET, Deoxys, AEZ, MORUS, ACORN, AEGIS, AES-GCM) For Automotive Security","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2943188976","doi":"https://doi.org/10.1109/icm.2018.8704025","mag":"2943188976"},"language":"en","primary_location":{"id":"doi:10.1109/icm.2018.8704025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icm.2018.8704025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 30th International Conference on Microelectronics (ICM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065490254","display_name":"Sahar Sharaf","orcid":"https://orcid.org/0000-0001-9069-9545"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Sahar Sharaf","raw_affiliation_strings":["Communications and electrical electronics, Cairo University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Communications and electrical electronics, Cairo University, Cairo, Egypt","institution_ids":["https://openalex.org/I145487455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063929219","display_name":"Hassan Mostafa","orcid":"https://orcid.org/0000-0003-0043-5007"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hassan Mostafa","raw_affiliation_strings":["Communications and electrical electronics, Cairo University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Communications and electrical electronics, Cairo University, Cairo, Egypt","institution_ids":["https://openalex.org/I145487455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065490254"],"corresponding_institution_ids":["https://openalex.org/I145487455"],"apc_list":null,"apc_paid":null,"fwci":1.4763,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.84988272,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"303","last_page":"306"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.7681057453155518},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6700409054756165},{"id":"https://openalex.org/keywords/acorn","display_name":"Acorn","score":0.6032616496086121},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6026399731636047},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5920616388320923},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5540413856506348},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.5323100090026855},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5150639414787292},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.4729982018470764},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4559597969055176},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22462350130081177}],"concepts":[{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.7681057453155518},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6700409054756165},{"id":"https://openalex.org/C2779843388","wikidata":"https://www.wikidata.org/wiki/Q3914781","display_name":"Acorn","level":2,"score":0.6032616496086121},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6026399731636047},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5920616388320923},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5540413856506348},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.5323100090026855},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5150639414787292},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.4729982018470764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4559597969055176},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22462350130081177},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icm.2018.8704025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icm.2018.8704025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 30th International Conference on Microelectronics (ICM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1965884932","https://openalex.org/W2181477265","https://openalex.org/W2299650499","https://openalex.org/W2408423497","https://openalex.org/W2586619161","https://openalex.org/W2596136487","https://openalex.org/W2757111556","https://openalex.org/W2797382335","https://openalex.org/W2808396079","https://openalex.org/W4230587652","https://openalex.org/W6685892428","https://openalex.org/W6713682023"],"related_works":["https://openalex.org/W2013587475","https://openalex.org/W2145913615","https://openalex.org/W2504284614","https://openalex.org/W4252641832","https://openalex.org/W4388634794","https://openalex.org/W2166454279","https://openalex.org/W2052912526","https://openalex.org/W2795574395","https://openalex.org/W2810248451","https://openalex.org/W3088982315"],"abstract_inverted_index":{"Connected":[0],"and":[1,37,58,75],"autonomous":[2],"cars":[3],"present":[4],"a":[5,29,38],"major":[6],"challenge":[7],"for":[8,44,51],"securing":[9],"vehicles":[10],"against":[11],"outside":[12],"or":[13],"inside":[14],"attacks":[15],"which":[16],"may":[17],"affect":[18],"the":[19,22,48],"safety":[20,57],"of":[21,40],"driver.":[23],"In":[24],"this":[25,66],"paper":[26,67],"there":[27],"is":[28],"comparison":[30],"between":[31],"seven":[32],"light":[33],"weight":[34],"authenticated":[35,62],"algorithms,":[36],"classification":[39],"automotive":[41],"embedded":[42],"systems":[43],"helping":[45],"in":[46,65],"choosing":[47],"suitable":[49],"algorithm":[50],"each":[52],"application":[53],"as":[54],"per":[55],"system":[56],"security":[59],"requirements.":[60],"The":[61],"algorithms":[63],"used":[64],"are":[68],"POET,":[69],"Deoxys,":[70],"AEZ,":[71],"MORUS,":[72],"ACORN,":[73],"AEGIS,":[74],"AES-GCM.":[76]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
