{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:29:27Z","timestamp":1740202167166,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885758","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:05:58Z","timestamp":1740081958000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Privacy and Trust in Societal Surveillance through Attribute-Based Encryption"],"prefix":"10.1109","author":[{"given":"Kasturi","family":"Routray","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Bhubaneswar,India"}]},{"given":"Aditya","family":"Das","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bhubaneswar,India"}]},{"given":"Padmalochan","family":"Bera","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bhubaneswar,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2024.102641"},{"key":"ref2","first-page":"113","article-title":"Ai application in surveillance for public safety: adverse risks for contemporary societies","author":"Rosiers","year":"2021","journal-title":"Towards an International Political Economy of Artificial Intelligence."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2042446"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.115076"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v8i4.4184"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70006-4"},{"key":"ref7","first-page":"3","article-title":"Data encryption standard","volume":"112","author":"Standard","year":"1999","journal-title":"Federal Information Processing Standards Publication"},{"key":"ref8","first-page":"19","article-title":"Rsa (cryptosystem)","author":"Rivest","year":"1978","journal-title":"Arithmetic Algorithms And Applications"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1314\/1\/012210"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2018.00120"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2969868"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61542-4_93"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.216"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS61882.2024.10602895"},{"volume-title":"Python GUI Programming with Tkinter: Develop responsive and powerful GUI applications with Tkinter.","year":"2018","author":"Moore","key":"ref16"},{"key":"ref17","first-page":"1725","article-title":"A brief introduction to opencv","volume-title":"2012 proceedings of the 35th international convention MIPRO","author":"Culjak"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0009183800002513"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","start":{"date-parts":[[2025,1,6]]},"location":"Bengaluru, India","end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885758.pdf?arnumber=10885758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:53:39Z","timestamp":1740138819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885758","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}