{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T20:13:32Z","timestamp":1726431212639},"reference-count":19,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,7,2]]},"DOI":"10.1080\/10798587.2015.1121615","type":"journal-article","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T09:46:00Z","timestamp":1461145560000},"page":"423-430","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Data Encryption Method Using Environmental Secret Key with Server Assistance"],"prefix":"10.32604","volume":"22","author":[{"given":"Kun-Lin","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Shun-Hung","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,4,20]]},"reference":[{"key":"CIT0002","first-page":"94","author":"Chen L.","year":"2012","journal-title":"Int\u2019l Conf. on Computer Science and Electronics Engineering"},{"key":"CIT0003","first-page":"209","volume":"11","author":"Damgard I. B.","year":"1998","journal-title":"Two-key triple encryption"},{"key":"CIT0004","first-page":"41","volume":"6","author":"Fedorchenko A.","year":"2015","journal-title":"J. of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"CIT0005","first-page":"18","volume":"38","author":"Geer D.","year":"2005","journal-title":"IEEE Computer"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2407327"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0958-z"},{"key":"CIT0009","first-page":"568","volume":"6632","author":"Lewko A. B.","year":"2011","journal-title":"Int\u2019l Conf. on Advances in Cryptology"},{"key":"CIT0010","first-page":"121","author":"Li J. Y.","year":"2004","journal-title":"Symposium on Operating Systems Design and Implementation"},{"key":"CIT0011","first-page":"80","volume":"5","author":"Lindauer B.","year":"2014","journal-title":"J. of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.52"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.21917\/ijsc.2014.0120"},{"volume-title":"USENIX An. Technical Conf","year":"2011","author":"Popa R. A.","key":"CIT0014"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70016-8"},{"key":"CIT0016","first-page":"47","volume":"4","author":"Tsai K. L.","year":"2014","journal-title":"J. of Internet Services and Information Security"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.786958"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279531"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.90"},{"key":"CIT0021","first-page":"324","author":"Zaffar F.","year":"2005","journal-title":"IEEE An. Computer Security Applications Conf."},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.824241"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1121615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:08:53Z","timestamp":1591189733000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1121615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,20]]},"references-count":19,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,21]]},"published-print":{"date-parts":[[2016,7,2]]}},"alternative-id":["10.1080\/10798587.2015.1121615"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1121615","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2016,4,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}