{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:00:13Z","timestamp":1726056013410},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335847"},{"type":"electronic","value":"9783030335854"}],"license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33585-4_55","type":"book-chapter","created":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:03:38Z","timestamp":1572105818000},"page":"559-568","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Approach to Overcome Dictionary and Plaintext Attack in SMS Encryption and Decryption Using Vignere Cipher"],"prefix":"10.1007","author":[{"given":"B.","family":"Bazeer Ahamed","sequence":"first","affiliation":[]},{"given":"K.","family":"Murugan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Kaur, A., Singh, S.: A hybrid technique of cryptography and water-marking for data encryption and decryption. In: Fourth International Conference Parallel, Distributed and Grid Computing (PDGC), pp. 351\u2013356, December 2016","DOI":"10.1109\/PDGC.2016.7913175"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Alam, K.M.R., Rahman, H., Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In: International Conference Networking Systems and Security (NSysS), pp. 1\u20135, January 2015","DOI":"10.1109\/NSysS.2015.7043532"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Chandra, S., Paira, S., Alam, S.S., Sanyal, G.: A comparative survey of symmetric and asymmetric key cryptography. In: International Conference Electronics, Communication and Computational Engineering (ICECCE), pp. 83\u201393, November 2014","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Mushtaque, M.A., Dhiman, H.: Implementation of new encryption algorithm with random key selection and minimum space complexity. In: International Conference on Advances Computer Engineering and Applications (ICACEA), pp. 507\u2013511, March 2015","DOI":"10.1109\/ICACEA.2015.7164797"},{"key":"55_CR5","doi-asserted-by":"crossref","unstructured":"Anand, A., Raj, A., Kohli, R., Bibhu, V.: Proposed symmetric key cryptography algorithm for data security. In: International Conference Innovation and Challenges in Cyber Security (ICICCS-INBUSH), pp. 159\u2013162, February 2016","DOI":"10.1109\/ICICCS.2016.7542294"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Lu, T., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: An analysis of attacks against anonymous communication networks. In: 7th International Conference Security Technology (SecTech), pp. 38\u201340, December 2014","DOI":"10.1109\/SecTech.2014.17"},{"key":"55_CR7","doi-asserted-by":"crossref","unstructured":"Gerhana, Y.A., Insanudin, E., Syarifudin, U., Zulmi, M.R.: Design of digital image application using vigenere cipher algorithm. In: International Conference on IEEE Cyber and IT Service Management, pp. 1\u20135, April 2016","DOI":"10.1109\/CITSM.2016.7577571"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Omran, S.S., Al-Khalid, A.S., Al-Saady, D.M.: A cryptanalytic attack on Vigenre cipher using genetic algorithm. In: Open Systems (ICOS), pp. 59\u201364, September 2011","DOI":"10.1109\/ICOS.2011.6079312"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Fahrianto, F., Masruroh, S.U., Ando, N.Z.: Encrypted SMS application on Android with combination of caesar cipher and vigenere algorithm. In: 2014 International Conference on Cyber and IT Service Management (CITSM), pp. 31\u201333. IEEE, November 2014","DOI":"10.1109\/CITSM.2014.7042170"},{"key":"55_CR10","unstructured":"Nacira, G.Z., Abdelaziz, A.: The -vigenere cipher extended to numerical data. In: Proceedings International Conference on IEEE Information and Communication Technologies: From Theory to Applications, pp. 413\u2013414, April 2004"},{"issue":"4","key":"55_CR11","first-page":"123","volume":"5","author":"BB Ahamed","year":"2012","unstructured":"Ahamed, B.B., Hariharan, S.: Implementation of network level security process through stepping stones by watermarking methodology. Int. J. Futur. Gener. Commun. Netw. 5(4), 123\u2013130 (2012)","journal-title":"Int. J. Futur. Gener. Commun. Netw."},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Ahamed, B.B., Yuvaraj, D.: Framework for faction of data in social network using link based mining process. In: International Conference on Intelligent Computing & Optimization, pp. 300\u2013309. Springer, Cham (2018)","DOI":"10.1007\/978-3-030-00979-3_31"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing and Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33585-4_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:10:37Z","timestamp":1572106237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33585-4_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"ISBN":["9783030335847","9783030335854"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33585-4_55","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"27 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Koh Samui","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}