{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:42:22Z","timestamp":1771702942731,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811557873","type":"print"},{"value":"9789811557880","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_50","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"519-526","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Parallel Message Encryption Through Playfair Cipher Using CUDA"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0938-6005","authenticated-orcid":false,"given":"Saloni","family":"Goyal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0885-8039","authenticated-orcid":false,"given":"Balie Shalomi","family":"Pacholi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8528-1646","authenticated-orcid":false,"given":"B. Ashwath","family":"Rao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5714-2611","authenticated-orcid":false,"given":"Shwetha","family":"Rai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9293-7460","authenticated-orcid":false,"given":"N. Gopalakrishna","family":"Kini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"issue":"4","key":"50_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.4316\/AECE.2014.04017","volume":"14","author":"N Stojanovic","year":"2014","unstructured":"Stojanovic, N., Stojanovic, D.: High performance processing and analysis of geospatial data using CUDA on GPU. Adv. Electr. Comput. Eng. 14(4), 109\u2013114 (2014)","journal-title":"Adv. Electr. Comput. Eng."},{"issue":"5\/6","key":"50_CR2","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1504\/IJHPCN.2016.10001330","volume":"9","author":"X Liao","year":"2016","unstructured":"Liao, X., Yu, L., Yao, H.: A novel GPU resources management and scheduling system based on virtual machines. Int. J. High Perform. Comput. Netw. 9(5\/6), 423 (2016)","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"50_CR3","unstructured":"GeeksforGeeks: A computer science portal for geeks. GeeksforGeeks (2019). Online Available: \nhttps:\/\/www.geeksforgeeks.org\/\n\n. Accessed 22 Oct 2019"},{"key":"50_CR4","doi-asserted-by":"publisher","unstructured":"Shakti Srivastava, S., Gupta, N.: A novel approach to security using extended playfair cipher. Int. J. Comput. Appl. 20(6), 39\u201343 (2011). Available: \nhttps:\/\/doi.org\/10.5120\/2435-3276","DOI":"10.5120\/2435-3276"},{"issue":"1","key":"50_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/LCA.2014.2299539","volume":"14","author":"J Power","year":"2015","unstructured":"Power, J., Hestness, J., Orr, M., Hill, M., Wood, D.: gem5-gpu: a heterogeneous CPU-GPU simulator. IEEE Comput. Archit. Lett. 14(1), 34\u201336 (2015)","journal-title":"IEEE Comput. Archit. Lett."},{"issue":"9","key":"50_CR6","doi-asserted-by":"publisher","first-page":"2428","DOI":"10.1109\/TPDS.2017.2672739","volume":"28","author":"C Jain","year":"2017","unstructured":"Jain, C., Flick, P., Pan, T., Green, O., Aluru, S.: An adaptive parallel algorithm for computing connected components. IEEE Trans. Parallel Distrib. Syst. 28(9), 2428\u20132439 (2017)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"50_CR7","doi-asserted-by":"publisher","unstructured":"Sharma, S., Shamhavi, S., Chaudhary, S., Khan, A.: Improvement of 16\u00a0\u00d7\u00a016 playfair cipher using random number generator. Int. J. Comput. Appl. 94(1), 1\u20138 (2014). Available: \nhttps:\/\/doi.org\/10.5120\/16304-5527","DOI":"10.5120\/16304-5527"},{"key":"50_CR8","doi-asserted-by":"publisher","unstructured":"Dhenakaran, S.S., Ilayaraja, M.: Extension of playfair cipher using 16\u00a0\u00d7\u00a016 matrix. Int. J. Comput. Appl. 48(7), 37\u201341 (2012). Available: \nhttps:\/\/doi.org\/10.5120\/7363-0192","DOI":"10.5120\/7363-0192"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:13:05Z","timestamp":1599552785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_50","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}