{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:04:21Z","timestamp":1743998661639,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642324970"},{"type":"electronic","value":"9783642324987"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32498-7_44","type":"book-chapter","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T14:04:28Z","timestamp":1344953068000},"page":"578-592","source":"Crossref","is-referenced-by-count":1,"title":["A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation"],"prefix":"10.1007","author":[{"given":"Yi-Li","family":"Huang","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Cheng-Ru","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"44_CR1","first-page":"96","volume":"2","author":"Y.L. Huang","year":"2011","unstructured":"Huang, Y.L., Leu, F.Y.: Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(3), 96\u2013107 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"1\/2","key":"44_CR2","first-page":"119","volume":"2","author":"S.M. Lee","year":"2012","unstructured":"Lee, S.M., Kim, D.S., Park, J.S.: A Survey and Taxonomy of Lightweight Intrusion Detection Systems. Journal of Internet Services and Information Security\u00a02(1\/2), 119\u2013131 (2012)","journal-title":"Journal of Internet Services and Information Security"},{"issue":"2\/3","key":"44_CR3","first-page":"161","volume":"1","author":"S.K. Pandey","year":"2011","unstructured":"Pandey, S.K., Barua, R.: Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes. Journal of Internet Services and Information Security\u00a01(2\/3), 161\u2013180 (2011)","journal-title":"Journal of Internet Services and Information Security"},{"key":"44_CR4","unstructured":"http:\/\/zh.wikipedia.org\/wiki\/DES"},{"key":"44_CR5","unstructured":"Yang, C.H.: Network Security: Theory and Practice. XBOOK MARKETING Co. Ltd. (September 2008)"},{"key":"44_CR6","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard"},{"issue":"1","key":"44_CR7","first-page":"4","volume":"2","author":"J. Hunker","year":"2011","unstructured":"Hunker, J., Probst, C.W.: Insiders and insider threats\u2014an overview of definitions and mitigation techniques. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a02(1), 4\u201327 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"issue":"6","key":"44_CR8","first-page":"891","volume":"17","author":"Y.F. Huang","year":"2011","unstructured":"Huang, Y.F., Leu, F.Y., Chiu, C.H., Lin, I.L.: Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. Journal of Universal Computer Science\u00a017(6), 891\u2013911 (2011)","journal-title":"Journal of Universal Computer Science"},{"issue":"1","key":"44_CR9","first-page":"28","volume":"2","author":"A.P. Moore","year":"2011","unstructured":"Moore, A.P., Cappelli, D.M., Carony, T.C., Shaw, E., Spooner, D., Trzeciak, R.F.: A preliminary model of insider theft of intellectual property. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a02(1), 28\u201349 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"44_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-36178-2_10","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Barkan","year":"2002","unstructured":"Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 160\u2013175. Springer, Heidelberg (2002)"},{"key":"44_CR11","unstructured":"Federal Information Processing Standards Publication 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES) (November 26, 2001)"},{"key":"44_CR12","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael. In: The First Advanced Encryption Standard Candidate Conference (September 1999)"},{"key":"44_CR13","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Block_cipher_modes_of_operation"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Eisenbarth, T., Kumar, S., Uhsadel, L., Paar, C., Poschmann, A.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers, 522\u2013533 (December 2007)","DOI":"10.1109\/MDT.2007.178"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for BlockCipher Modes of OperationMethods and Techniques. Natl. Inst. Stand. Technol. Spec. Publ. 800-38A 2001 ED, 66 pages (December 2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"44_CR16","unstructured":"Mils Electronic, One Time Key Encryption, http:\/\/www.mils.com\/"},{"issue":"3","key":"44_CR17","first-page":"85","volume":"2","author":"F.Y. Yang","year":"2011","unstructured":"Yang, F.Y., Liu, Z.W., Chiu, S.H.: Mobile Banking Payment System. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a02(3), 85\u201395 (2011)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"El-Ramly, S.H., El-Garf, T., Soliman, A.H.: Dynamic Generation of S-boxes in Block Cipher Systems. In: Radio Science Conference, pp. 389\u2013397 (August 2002)","DOI":"10.1109\/NRSC.2001.929396"}],"container-title":["Lecture Notes in Computer Science","Multidisciplinary Research and Practice for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32498-7_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T21:49:20Z","timestamp":1743976160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32498-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642324970","9783642324987"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32498-7_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}