{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:44:42Z","timestamp":1730195082135,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387061","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T20:16:50Z","timestamp":1112386610000},"page":"332-337","source":"Crossref","is-referenced-by-count":1,"title":["Secured Net-BANKING by \u03b8-VIGENERE in syverson's protocol"],"prefix":"10.1109","author":[{"given":"G.","family":"Nacira","sequence":"first","affiliation":[]},{"given":"A.","family":"Abdelaziz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Mode?lisation object avec UML","author":"muller","year":"0","journal-title":"Eyrolles 1997"},{"key":"16","article-title":"?- Vignere cipher extended to numerical data","author":"ghoualmi-zine","year":"2004","journal-title":"IEEE Catalog Number 04EX852"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1998.683149"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1201\/9781420093759.ch51"},{"key":"11","first-page":"191","article-title":"Le Chiffrement de Vigene?re de degre? ? dans une application Net-Banking","author":"ghoualmi-zine","year":"2003","journal-title":"International Confe?rence on Image and Signal Proceessing"},{"journal-title":"Distributed algorithm","year":"1996","author":"lynch","key":"12"},{"journal-title":"HP's International Cryptography Framework Compromise or Threat?","year":"1997","author":"hedberg","key":"3"},{"journal-title":"Cryptography The Importance of Not Being Different","year":"1999","author":"schnerer","key":"2"},{"key":"1","article-title":"Re?seaux locaux","author":"pierre","year":"0","journal-title":"Eyrolles 91"},{"key":"10","first-page":"1109","article-title":"The VIGENERE cipher of degree ? in NET -BANKING application","volume":"2","author":"ghoualmi-zine","year":"2003","journal-title":"Proceedings IADIS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1999.0765"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Data Cryption Standard","year":"1977","key":"5"},{"year":"0","key":"4"},{"key":"9","article-title":"A formal model of rational exchange and its application to the analysis of Syverson's protocol","author":"buttyan","year":"2003","journal-title":"Computers & Security"},{"key":"8","article-title":"Transfert se?curise? d'images par chiffrement de vigene?re","author":"puech","year":"0","journal-title":"EUSIPCO2000"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387061.pdf?arnumber=1387061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T22:12:09Z","timestamp":1489529529000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387061","relation":{},"subject":[]}}