{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:15:22Z","timestamp":1753884922186,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/ccwc.2018.8301636","type":"proceedings-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T17:14:26Z","timestamp":1520270066000},"page":"861-866","source":"Crossref","is-referenced-by-count":3,"title":["USB level data security using cryptographic approach"],"prefix":"10.1109","author":[{"given":"Rahul","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Hitesh","family":"Sarda","sequence":"additional","affiliation":[]},{"given":"Tanisha","family":"Bhattacharjee","sequence":"additional","affiliation":[]},{"given":"Aiswarya","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Prithwiswar","family":"Bhattacharya","sequence":"additional","affiliation":[]},{"given":"Sugata","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Shankhadip","family":"Mallick","sequence":"additional","affiliation":[]},{"given":"Tapapriya","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Jayati","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Priyodarshini","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Siddhartha","family":"Sarker","sequence":"additional","affiliation":[]},{"given":"Subhasree","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Sauvik","family":"Bal","sequence":"additional","affiliation":[]},{"given":"Rupayan","family":"Das","sequence":"additional","affiliation":[]},{"given":"Somen","family":"Nayak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1821748.1821794"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2017.8098893"},{"key":"ref12","article-title":"A secure three-party authentication protocol for wireless body area networks","author":"viswakarma","year":"0","journal-title":"2017 Third International Conference on Sensing Signal Processing and Security (ICSSS) ICSSS"},{"key":"ref13","article-title":"A newall-optical cryptography technique applied to WDM-compatible DPSK signals","author":"abbade","year":"0","journal-title":"Published in Transparent Optical Networks (ICTON) 15th International Conference on"},{"key":"ref14","article-title":"Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications","volume":"5","author":"seo","year":"2017","journal-title":"Published in IEEE Access"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NSysS.2017.7885810"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CIACT.2017.7977317"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714616"},{"key":"ref6","article-title":"Security of Wireless Sensor Networks","author":"wahsheh","year":"2011","journal-title":"Information Technology New Generations (ITNG) 2011 Eighth International"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCT.2017.8117849"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3056662.3056685"},{"key":"ref7","article-title":"Improved Image Encryption Technique using Multi Chaotic System","author":"jamal","year":"0","journal-title":"in-2008 Workshop on Power Electronics and Intelligent Transportation System IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1947940.1948060"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139943"},{"key":"ref9","article-title":"A novel cryptographic encryption technique of video images using quantumcryptography for satellite communications","author":"kester","year":"0","journal-title":"Adaptive Science and Technology (ICAST) 2013 International Conference on Pretoria"}],"event":{"name":"2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2018,1,8]]},"location":"Las Vegas, NV","end":{"date-parts":[[2018,1,10]]}},"container-title":["2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8293728\/8301613\/08301636.pdf?arnumber=8301636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T16:45:21Z","timestamp":1522687521000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8301636\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccwc.2018.8301636","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}