{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:22:52Z","timestamp":1730193772458,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,28]]},"DOI":"10.1109\/acit50332.2020.9300118","type":"proceedings-article","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T20:37:09Z","timestamp":1609792629000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Application of Encryption Algorithms with RMI Protocol"],"prefix":"10.1109","author":[{"given":"Rana Riad K.","family":"AL-Taie","sequence":"first","affiliation":[]},{"given":"Hiba A.","family":"Abu-Alsaad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/997140.997146"},{"key":"ref11","first-page":"914","article-title":"Remote Procedure Call: Limitations and Drawbacks","volume":"1","author":"kukreja","year":"2014","journal-title":"Int J Res"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/9781860947308_0015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(01)00375-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.34"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJNVO.2010.035403"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2008.05.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1312740"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.838"},{"journal-title":"New Comparative Study between DES 3DES and AES Within Nine Factors","year":"2010","author":"alanazi","key":"ref19"},{"journal-title":"The Jini(TM) Specification (The Jini(TM) Technology Series)","year":"2000","author":"arnold","key":"ref4"},{"journal-title":"An Introduction to the Enterprise JavaBeans 3 0 (EJB 3) Specification","year":"0","author":"sun","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.08.006"},{"key":"ref5","first-page":"265","article-title":"A Distributed Object Model for the Java System","volume":"9","author":"wollrath","year":"1996","journal-title":"ConfObjectOriented Techno I"},{"key":"ref8","first-page":"36","article-title":"Building secure Java RMI servers","volume":"27","author":"marques","year":"2002","journal-title":"Dr Dobbs J"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1168054.1168063"},{"journal-title":"Mastering RMI","year":"2001","author":"berg","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9128(199809\/11)10:11\/13<941::AID-CPE391>3.0.CO;2-T"},{"key":"ref1","article-title":"Distributed Java Programming with RMI and CORBA","author":"mahmoud","year":"2002","journal-title":"Oracle"},{"key":"ref20","first-page":"1","article-title":"Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques","volume":"3","author":"naji","year":"2009","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref22","article-title":"New Frame Work of Hidden Data with in Non Multimedia File","author":"alanazi","year":"2010","journal-title":"Int J Comput Netw Secur"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2010.V2.141"},{"key":"ref24","article-title":"Evaluation of DES, TDES, AES, Blowfish and Twofish Encryption Algorithm Based on Space Complexity","volume":"3","author":"mushtaque","year":"2014","journal-title":"Int J Eng Res Technol"},{"key":"ref23","first-page":"289","article-title":"Evaluation of encryption algorithms for privacy preserving association rules mining","volume":"14","author":"el-sisi","year":"2012","journal-title":"Int J Netw Secur"},{"key":"ref25","first-page":"24","volume":"26","author":"ruixian","year":"0","journal-title":"Distributed Computing via RMI and CORBA"}],"event":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2020,11,28]]},"location":"Giza, Egypt","end":{"date-parts":[[2020,11,30]]}},"container-title":["2020 21st International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9299884\/9299962\/09300118.pdf?arnumber=9300118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:41:28Z","timestamp":1656344488000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9300118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,28]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/acit50332.2020.9300118","relation":{},"subject":[],"published":{"date-parts":[[2020,11,28]]}}}