{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:18:33Z","timestamp":1743038313859,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_6","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"78-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $$\\varGamma \\Big (-\\frac{\\alpha }{\\beta }\\Big ) = -\\frac{\\beta }{\\alpha }\\, \\varGamma \\Big (\\frac{\\beta -\\alpha }{\\beta }\\Big )$$"],"prefix":"10.1007","author":[{"given":"Abhilash Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Nirmalya","family":"Kar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Mathur, S., Gupta, D., Goar, V., Kuri, M.: Analysis and design of enhanced RSA algorithm to improve the security. In: 3rd International Conference on Computational Intelligence & Communication Technology (CICT), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/CIACT.2017.7977330"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Mallouli, F., Hellal, A., Saeed, N.S., Alzahrani, F.A.: A survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms. In: 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 173\u2013176. IEEE (2019)","DOI":"10.1109\/CSCloud\/EdgeCom.2019.00022"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.ffa.2018.01.009","volume":"51","author":"A Amadori","year":"2018","unstructured":"Amadori, A., Pintore, F., Sala, M.: On the discrete logarithm problem for prime-field elliptic curves. Finite Fields Appl. 51, 168\u2013182 (2018)","journal-title":"Finite Fields Appl."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Indrayani, R., Ferdiansyah, P., Satria, D.A.: Effectiveness comparison of the AES and 3DES cryptography methods on email text messages. In: International Conference on Information and Communications Technology (ICOIACT), pp. 66\u201369. IEEE (2019)","DOI":"10.1109\/ICOIACT46704.2019.8938579"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Buchanan, W.J., Li, S., Asif, R.: Lightweight cryptography methods. J. Cyber Secur. Technol. 1(3\u20134), 187\u2013201 (2017)","DOI":"10.1080\/23742917.2017.1384917"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Dooley, J.F.: History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. Springer, Heidelberg (2018)","DOI":"10.1007\/978-3-319-90443-6"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/09720529.2019.1569821","volume":"22","author":"A Abusukhon","year":"2019","unstructured":"Abusukhon, A., Anwar, M.N., Mohammad, Z., Alghannam, B.: A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm. J. Discret. Math. Sci. Cryptogr. 22(1), 65\u201381 (2019)","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Ali, S., et al.: An efficient cryptographic technique using modified Diffie-Hellman in wireless sensor networks. Int. J. Distrib. Sens. Netw. 16(6) (2020)","DOI":"10.1177\/1550147720925772"},{"key":"6_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-981-15-3666-3_15","volume-title":"Advances in Computational Intelligence, Security and Internet of Things","author":"AK Das","year":"2020","unstructured":"Das, A.K., Das, A., Kar, N.: An approach towards encrypting paired digits using dynamic programming and Diffie-Hellman key exchange. In: Saha, A., Kar, N., Deb, S. (eds.) ICCISIoT 2019. CCIS, vol. 1192, pp. 170\u2013181. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-3666-3_15"},{"key":"6_CR10","unstructured":"Wu, H., Zheng, W., Chiesa, A., Popa, R.A., Stoica, I.: DIZK: a distributed zero knowledge proof system. In: 27th USENIX Security Symposium, pp. 675\u2013692 (2018)"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Major, W., Buchanan, W.J., Ahmad, J.: An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dyn. 99(4), 3065\u20133087 (2020). https:\/\/doi.org\/10.1007\/s11071-020-05463-3","DOI":"10.1007\/s11071-020-05463-3"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Joshi, P., Verma, M., Verma, P.R.: Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN. In: International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp. 527\u2013532. IEEE (2015)","DOI":"10.1109\/ICCICCT.2015.7475336"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Harn, L., Mehta, M., Hsin, W.J.: Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA). IEEE Commun. Lett. 8(3), 198\u2013200 (2004)","DOI":"10.1109\/LCOMM.2004.825705"},{"key":"6_CR14","unstructured":"Artin, E.: The Gamma Function. Courier Dover Publications, New York (2015)"},{"issue":"2","key":"6_CR15","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/S0377-0427(00)00586-0","volume":"135","author":"EA Karatsuba","year":"2001","unstructured":"Karatsuba, E.A.: On the asymptotic representation of the Euler gamma function by Ramanujan. J. Comput. Appl. Math. 135(2), 225\u2013240 (2001)","journal-title":"J. Comput. Appl. Math."},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1137\/0701008","volume":"1","author":"C Lanczos","year":"1964","unstructured":"Lanczos, C.: A precision approximation of the gamma function. J. Soc. Ind. Appl. Math. Ser. B Numer. Anal. 1(1), 86\u201396 (1964)","journal-title":"J. Soc. Ind. Appl. Math. Ser. B Numer. Anal."},{"issue":"2","key":"6_CR17","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.jmaa.2012.11.023","volume":"402","author":"C Mortici","year":"2013","unstructured":"Mortici, C.: A continued fraction approximation of the gamma function. J. Math. Anal. Appl. 402(2), 405\u2013410 (2013)","journal-title":"J. Math. Anal. Appl."},{"issue":"5","key":"6_CR18","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1080\/00029890.1961.11989696","volume":"68","author":"AF Horadam","year":"1961","unstructured":"Horadam, A.F.: A generalized Fibonacci sequence. Am. Math. Mon. 68(5), 455\u2013459 (1961)","journal-title":"Am. Math. Mon."},{"issue":"3","key":"6_CR19","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1037\/1082-989X.2.3.292","volume":"2","author":"LT DeCarlo","year":"1997","unstructured":"DeCarlo, L.T.: On the meaning and use of kurtosis. Psychol. Methods 2(3), 292 (1997)","journal-title":"Psychol. Methods"},{"issue":"4","key":"6_CR20","first-page":"391","volume":"33","author":"RA Groeneveld","year":"1984","unstructured":"Groeneveld, R.A., Meeden, G.: Measuring skewness and kurtosis. J. R. Stat. Soc. Ser. D (Stat.) 33(4), 391\u2013399 (1984)","journal-title":"J. R. Stat. Soc. Ser. D (Stat.)"},{"key":"6_CR21","unstructured":"Chatterjee, S., Hadi, A.S.: Regression Analysis by Example. John Wiley & Sons, Hoboken (2015)"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:12:12Z","timestamp":1638450732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}