{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:01:21Z","timestamp":1775667681133,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819967056","type":"print"},{"value":"9789819967063","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-6706-3_42","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T11:02:34Z","timestamp":1700910154000},"page":"495-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Data Security Using Hybrid RSA-TWOFISH Encryption Technique on Cloud Computing"],"prefix":"10.1007","author":[{"given":"A.","family":"Jenice Prabhu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Vallisree","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. N.","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Sitharthan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Rajesh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Ahilan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Usha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Mishra, S., Tyagi, A.K.: The role of machine learning techniques in internet of things-based cloud applications. In: Artificial Intelligence-Based Internet of Things Systems, pp. 105\u2013135 (2022)","DOI":"10.1007\/978-3-030-87059-1_4"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Akhtar, N., et al.: A comprehensive overview of privacy and data security for cloud storage. Int. J. Sci. Res. Sci. Eng. Technol. (2021)","DOI":"10.32628\/IJSRSET21852"},{"key":"42_CR3","unstructured":"Bhadra, S.: Cloud computing threats and risks: uncertainty and unconrollability in the risk society (2020)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Krishna, R.R., et al.: State-of-the-art review on IoT threats and attacks: taxonomy, challenges and solutions. Sustainability 13\u201316, 9463 (2021)","DOI":"10.3390\/su13169463"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Saad, W., et al.: Wireless Communications and Networking for Unmanned Aerial Vehicles. Cambridge University Press (2020)","DOI":"10.1017\/9781108691017"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Hashim, F.A., et al.: Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl. Intell. 51, 1531\u20131551 (2021)","DOI":"10.1007\/s10489-020-01893-z"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Sander, B.: Democracy under the influence: paradigms of state responsibility for cyber influence operations on elections. Chin. J. Int. Law 18(1), 1\u201356 (2019)","DOI":"10.1093\/chinesejil\/jmz003"},{"key":"42_CR8","unstructured":"Paiva, T.A.B.: Attacking and defending post-quantum cryptography candidates. Diss., Universidade de S\u00e3o Paulo (2022)"},{"issue":"1","key":"42_CR9","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1186\/s13677-022-00336-z","volume":"11","author":"R Priyadarshini","year":"2022","unstructured":"Priyadarshini, R., et al.: An enhanced encryption-based security framework in the CPS cloud. J. Cloud Comput. 11(1), 64 (2022)","journal-title":"J. Cloud Comput."},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Tyagi, K., Yadav, S.K., Singh, M.: Cloud data security and various security algorithms. J. Phys. Conf. Ser. 1998 (2021). IOP Publishing","DOI":"10.1088\/1742-6596\/1998\/1\/012023"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Imam, R., et al.: Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access 9, 155949\u2013155976 (2021)","DOI":"10.1109\/ACCESS.2021.3129224"},{"key":"42_CR12","unstructured":"Soni, P., Malik, R.: Efficient cipher scheme for hybrid models with internal structure modification"}],"container-title":["Smart Innovation, Systems and Technologies","Intelligent Data Engineering and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-6706-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T11:11:08Z","timestamp":1700910668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-6706-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819967056","9789819967063"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-6706-3_42","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"value":"2190-3018","type":"print"},{"value":"2190-3026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FICTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers of Intelligent Computing: Theory and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cardiff","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ficta2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ficta.co.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}