{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T04:37:53Z","timestamp":1727239073757},"reference-count":19,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"published-print":{"date-parts":[[2024,5,3]]},"DOI":"10.1080\/17445760.2023.2284429","type":"journal-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T06:29:01Z","timestamp":1700548141000},"page":"279-291","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["End-to-end data security with DMaya on IPFS: keyless secured private swarm for the closed user group"],"prefix":"10.1080","volume":"39","author":[{"given":"Deepthi","family":"Haridas","sequence":"first","affiliation":[{"name":"Department of Space, Government of India, Advanced Data Processing Research Institute (ADRIN), Secunderabad, Telangana, India"}]},{"given":"Hari","family":"Om Prakash","sequence":"additional","affiliation":[{"name":"Department of Space, Government of India, Advanced Data Processing Research Institute (ADRIN), Secunderabad, Telangana, India"}]},{"given":"Rakesh","family":"Shukla","sequence":"additional","affiliation":[{"name":"Department of Space, Government of India, Advanced Data Processing Research Institute (ADRIN), Secunderabad, Telangana, India"}]},{"given":"Rallapalli","family":"Phani Bhushan","sequence":"additional","affiliation":[{"name":"Department of Space, Government of India, Advanced Data Processing Research Institute (ADRIN), Secunderabad, Telangana, India"}]}],"member":"301","published-online":{"date-parts":[[2023,11,20]]},"reference":[{"key":"e_1_3_3_2_1","unstructured":"Cryptomathic white paper on: key management compliance-explained. Available from: www.cryptomathic.com\/whitepapers\/Keymanagementcompliance."},{"key":"e_1_3_3_3_1","unstructured":"Cheng Z Comley R. Attacks On An ISO\/IEC 11770-2 key establishment protocol."},{"key":"e_1_3_3_4_1","unstructured":"ISO. Information technology-security techniques-key management-part 2: Mechanisms using symmetric techniques. 1996. ISO\/IEC 11770\u20132."},{"key":"e_1_3_3_5_1","unstructured":"International Organization for Standardization. Geneva:Switzerland. ISO\/IEC 11770-2:2018. Information technology Security techniques \u2013 Key Management Part 2: Mechanisms using Symmetric Techniques;Edition-3."},{"key":"e_1_3_3_6_1","unstructured":"Benet J. IPFS- Content Addressed Versioned P2P File System. arXiv preprint arXiv:1407.3561. 2014."},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00443-0"},{"key":"e_1_3_3_8_1","doi-asserted-by":"crossref","unstructured":"Karapapas C Pittaras I Fotiou N et\u00a0al. Ransomware as a service using smart contracts and IPFS. IEEE International Conference on Blockchain and Cryptocurrency(ICBC); 2020. p. 1\u20135.","DOI":"10.1109\/ICBC48266.2020.9169451"},{"key":"e_1_3_3_9_1","doi-asserted-by":"crossref","unstructured":"Moubarak J Chamoun M Filiol E. Hiding malware in distributed storage. In: IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT); 2019. p. 720\u2013725.","DOI":"10.1109\/JEEIT.2019.8717384"},{"key":"e_1_3_3_10_1","doi-asserted-by":"crossref","unstructured":"Ali MS Dolui K Antonelli F. IOT data privacy via blockchains and IPFS. In: Proceedings of the seventh International Conference on the Internet of Things; p. 1\u20137. 2017.","DOI":"10.1145\/3131542.3131563"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.014"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/su11247054"},{"key":"e_1_3_3_15_1","unstructured":"Alusri M Camillo A Giangrew E et\u00a0al. Make users own their data: a decentralised personal data store prototype based on Ethereum and IPFS. In: 3rd International Conference on Smart and Sustainable Technologies (SPLITECH) IEEE; 2018. p. 1\u20137."},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi7040445"},{"key":"e_1_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Josefsson S. The base16 base32 & base64 data encodings.RFC 4648; 2006. p.1\u201318.","DOI":"10.17487\/rfc4648"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_3_19_1","doi-asserted-by":"crossref","unstructured":"Budde M Kopke M Berning M et\u00a0al. Using a 2DST waveguide for usable physically constrained out of band wifi authentication. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive & Ubiquitous Computing; 2013. p. 221\u2013224.","DOI":"10.1145\/2493432.2494264"},{"issue":"4","key":"e_1_3_3_20_1","first-page":"559","article-title":"Generating quasigroups for cryptographic applications","volume":"12","author":"Koscielny C.","year":"2002","unstructured":"Koscielny C. Generating quasigroups for cryptographic applications. Int J Appl Math Comput Sci. 2002;12(4):559\u2013570.","journal-title":"Int J Appl Math Comput Sci"}],"container-title":["International Journal of Parallel, Emergent and Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17445760.2023.2284429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T21:15:41Z","timestamp":1727212541000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17445760.2023.2284429"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,5,3]]}},"alternative-id":["10.1080\/17445760.2023.2284429"],"URL":"https:\/\/doi.org\/10.1080\/17445760.2023.2284429","relation":{},"ISSN":["1744-5760","1744-5779"],"issn-type":[{"type":"print","value":"1744-5760"},{"type":"electronic","value":"1744-5779"}],"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=gpaa20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-12-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}