{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:58:18Z","timestamp":1758635898378,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732151","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T20:57:45Z","timestamp":1478638665000},"page":"844-850","source":"Crossref","is-referenced-by-count":2,"title":["Cryptographic turbo code for image transmission over mobile networks"],"prefix":"10.1109","author":[{"given":"Vidya","family":"Sawant","sequence":"first","affiliation":[]},{"given":"Archana","family":"Bhise","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2010.103"},{"key":"ref11","first-page":"3","article-title":"On security of elliptic curve cryptosystems against attacks with special-purpose hardware","author":"guneysu","year":"2006","journal-title":"SHARCS - Special-purpose Hardware for Attacking Cryptographic Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-3922-5.ch020"},{"key":"ref13","article-title":"Maximum a posteriori decoding algorithms for turbo codes","author":"sadjadpour","year":"2000","journal-title":"AeroSense 2000 International Society for Optics and Photonics"},{"key":"ref4","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"42","author":"mc","year":"1978","journal-title":"DSN progress report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1017925603986"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_6"},{"key":"ref5","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"PROBLEMS CONTROL INFORM THEORY"},{"key":"ref8","first-page":"861","article-title":"A combined encryption and error correction scheme: AES-Turbo","volume":"1","author":"cam","year":"2009","journal-title":"Journal of Electrical & Electronics Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2005.301246"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.485713"},{"key":"ref1","first-page":"1261","article-title":"Near optimum error-correcting coding and decoding: Turbo-codes","author":"berrou","year":"2002","journal-title":"IEEE Trans Communications"},{"key":"ref9","first-page":"121","article-title":"Crypto-Coding as RSA-Turbo for Land Mobile Satellite Channel","volume":"3","author":"khanai","year":"2015","journal-title":"International journal of Electronics and Electrical Engineering"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732151.pdf?arnumber=7732151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T12:10:24Z","timestamp":1480507824000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732151","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}