{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:00Z","timestamp":1767337860231,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819922635"},{"type":"electronic","value":"9789819922642"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-2264-2_8","type":"book-chapter","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T10:56:15Z","timestamp":1683802575000},"page":"98-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Modified Blowfish Encryption Algorithm for\u00a0Wireless Body Area Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1353-5891","authenticated-orcid":false,"given":"S.","family":"Divya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8847-0749","authenticated-orcid":false,"given":"K. V.","family":"Prema","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4839-0082","authenticated-orcid":false,"given":"Balachandra","family":"Muniyal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,12]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Milad, A.A., Muda, Z., Noh, Z.A.B.M., Algaet, M.A.: Comparative study of performance in cryptography algorithms (blowfish and skipjack). J. Comput. Sci. 8(7), 1191\u20131197 (2012). https:\/\/doi.org\/10.3844\/jcssp.2012.1191.1197,https:\/\/www.researchgate.net\/publication\/250614450. the 6th International Conference on Ambient Systems, Networks and Technologies (ANT-2015), the 5th International Conference on Sustainable Energy Information Technology (SEIT-2015)","DOI":"10.3844\/jcssp.2012.1191.1197,"},{"issue":"10","key":"8_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0272-9","volume":"39","author":"A Ali","year":"2015","unstructured":"Ali, A., Khan, F.A.: Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J. Med. Syst. 39(10), 1\u201314 (2015)","journal-title":"J. Med. Syst."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.compeleceng.2017.03.008","volume":"63","author":"AK Das","year":"2017","unstructured":"Das, A.K., Zeadally, S., Wazid, M.: Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63, 196\u2013208 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Divya, S., Prema, K., Muniyal, B.: Privacy preservation mechanism for the data used in image authentication. In: 2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/DISCOVER47552.2019.9007939"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Gonz\u00e1lez-Valenzuela, S., Liang, X., Cao, H., Chen, M., Leung, V.C.M.: Body Area Networks, pp. 17\u201337. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/5346_26,https:\/\/doi.org\/10.1007\/5346_2012_26","DOI":"10.1007\/5346_26"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Masdari, M., Ahmadzadeh, S., Bidaki, M.: Key management in wireless body area network: challenges and issues. J. Netw. Comput. Appl. 91(Supplement C), 36\u201351 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.04.008, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804517301492","DOI":"10.1016\/j.jnca.2017.04.008"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Mota, A.V., Azam, S., Shanmugam, B., Yeo, K.C., Kannoorpatti, K.: Comparative analysis of different techniques of encryption for secured data transmission. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), pp. 231\u2013237. IEEE (2017)","DOI":"10.1109\/ICPCSI.2017.8392158"},{"key":"8_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-981-10-3433-6_28","volume-title":"Smart Trends in Information Technology and Computer Communications","author":"R Patel","year":"2016","unstructured":"Patel, R., Kamboj, P.: Security enhancement of blowfish block cipher. In: Unal, A., Nayak, M., Mishra, D.K., Singh, D., Joshi, A. (eds.) SmartCom 2016. CCIS, pp. 231\u2013238. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-3433-6_28"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Proc. Comput. Sci. 78(Supplement C), 617\u2013624 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.02.108, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050916001101. 1st International Conference on Information Security and Privacy 2015","DOI":"10.1016\/j.procs.2016.02.108"},{"key":"8_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-030-28005-5_34","volume-title":"Systems, Software and Services Process Improvement","author":"PC Paul","year":"2019","unstructured":"Paul, P.C., Loane, J., Regan, G., McCaffery, F.: Analysis of attacks and security requirements for wireless body area networks - a systematic literature review. In: Walker, A., O\u2019Connor, R.V., Messnarz, R. (eds.) EuroSPI 2019. CCIS, vol. 1060, pp. 439\u2013452. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28005-5_34"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Quilala, T.F., Sison, A., Medina, R.: Modified blowfish algorithm. Indonesian J. Electr. Eng. Comput. Sci. 12, 38\u201345 (10). https:\/\/doi.org\/10.11591\/ijeecs.v12.i1.pp38-45","DOI":"10.11591\/ijeecs.v12.i1.pp38-45"},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.3390\/s100403911","volume":"10","author":"SM Raazi","year":"2010","unstructured":"Raazi, S.M., Lee, H., Lee, S., Lee, Y.K.: Bari+: a biometric based distributed key management approach for wireless body area networks. Sensors 10(4), 3911\u20133933 (2010)","journal-title":"Sensors"},{"issue":"20","key":"8_CR13","first-page":"9236","volume":"12","author":"BS Ross","year":"2017","unstructured":"Ross, B.S., Josephraj, V.: Performance enhancement of blowfish encryption using RK blowfish. Int. J. Appl. Eng. Res. 12(20), 9236\u20139244 (2017)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Sampangi, R.V., Dey, S., Urs, S.R., Sampalli, S.: A security suite for wireless body area networks. arXiv preprint arXiv:1202.2171 (2012)","DOI":"10.5121\/ijnsa.2012.4110"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2016.11.033","volume":"78","author":"J Shen","year":"2018","unstructured":"Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Futur. Gener. Comput. Syst. 78, 956\u2013963 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"8_CR16","unstructured":"Stallings, W.: Cryptography and Network Security Principles and practice. Pearson Education Inc, publishing as Prentice Hall, 3 edn. (2006)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-60865-6_39","volume-title":"Fast Software Encryption","author":"S Vaudenay","year":"1996","unstructured":"Vaudenay, S.: On the weak keys of blowfish. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27\u201332. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-60865-6_39"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.: EKG-based key agreement in body sensor networks. In: IEEE Infocom Workshops 2008, pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.4544608"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-2264-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T10:58:44Z","timestamp":1683802724000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-2264-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819922635","9789819922642"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-2264-2_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"12 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Manipal","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.atis2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}