{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:06:03Z","timestamp":1730221563443,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/ewdts50664.2020.9224775","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T20:00:47Z","timestamp":1602792047000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Cryptographic Algorithm Implementation for Data Encryption in DBMS MS SQL Server"],"prefix":"10.1109","author":[{"given":"Olga A.","family":"Safaryan","sequence":"first","affiliation":[]},{"given":"Evgenia V.","family":"Roshchina","sequence":"additional","affiliation":[]},{"given":"Larissa V.","family":"Cherckesova","sequence":"additional","affiliation":[]},{"given":"Elena V.","family":"Pinevich","sequence":"additional","affiliation":[]},{"given":"Andrey G.","family":"Lobodenko","sequence":"additional","affiliation":[]},{"given":"Boris A.","family":"Akishin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"3","article-title":"Information processing systems. Cryptographic protection.Cryptographic conversion algorithm","year":"1990","journal-title":"Introduce"},{"key":"ref3","first-page":"116","article-title":"Cryptographic protocols: basic properties and vulnerabilities","author":"cheremushkin","year":"2009","journal-title":"Institute of Cryptography Communications and Informatics"},{"key":"ref10","first-page":"293","article-title":"Database Backup Security Securing SQL Server (3rd Edition) Protecting administrator Database from Attackers","author":"cherry","year":"2015"},{"key":"ref6","first-page":"324","article-title":"Information security and protection","author":"baranova","year":"2017","journal-title":"M RIOR Infra&#x2013;M"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(03)90140-3"},{"key":"ref5","first-page":"738","article-title":"Microsoft SQL Server 2008. Administrator's Pocket Consultant","author":"stanek","year":"2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(81)90001-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.011"},{"journal-title":"Announcing the Advanced Encrytpion Standard (AES)","year":"2001","key":"ref7"},{"key":"ref2","first-page":"21","article-title":"Cryptographic Information Protection. Block Ciphers. Code &#x201D;Kuznechik\" (Grasshopper) and the modes of operation of block ciphers","year":"2015","journal-title":"Introduced 2015&#x2013;07&#x2013;19 &#x2013;M Publishing house of standards"},{"key":"ref9","first-page":"241","article-title":"Securing Network Services and Protocols MCSE. Study Guide Designing security for Windows Server","volume":"70?298","year":"2004","journal-title":"Chapter 5 2003 Network Exam"},{"key":"ref1","first-page":"386","article-title":"Using Dapper C # in programming","author":"otinchiev","year":"2019","journal-title":"SPb Peter"}],"event":{"name":"2020 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2020,9,4]]},"location":"Varna, Bulgaria","end":{"date-parts":[[2020,9,7]]}},"container-title":["2020 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9220087\/9224633\/09224775.pdf?arnumber=9224775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T16:06:10Z","timestamp":1656345970000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9224775\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ewdts50664.2020.9224775","relation":{},"subject":[],"published":{"date-parts":[[2020,9]]}}}