{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:55:17Z","timestamp":1761663317322},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883449","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T14:10:33Z","timestamp":1409753433000},"page":"993-998","source":"Crossref","is-referenced-by-count":2,"title":["Key-Based Coded Permutation ciphers with improved error performance and security in wireless channels"],"prefix":"10.1109","author":[{"given":"Walid Y.","family":"Zibideh","sequence":"first","affiliation":[]},{"given":"Mustafa M.","family":"Matalgah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Comprehensive 32\/64bit Coverage","year":"2009","key":"15"},{"key":"13","article-title":"Cryptography and network security","author":"stallings","year":"2003","journal-title":"Principles and Practice"},{"journal-title":"Data Encryption Standard (DES)","year":"1999","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/RWS.2011.5725509"},{"journal-title":"Cryptography and Network Security","year":"2008","author":"forouzan","key":"12"},{"journal-title":"End-to-end Confidentiality for Continous-media Applications in Wireless Systems","year":"2000","author":"reason","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2285522"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.728"},{"key":"10","article-title":"Cryptcoding encryption and errorcorrection coding in a single step","author":"gligoroski","year":"2006","journal-title":"International Conference on Security and Management"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.1676636"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2010.103"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20080050"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/11767480_21"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_39"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(97)00129-1"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883449.pdf?arnumber=6883449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T20:47:49Z","timestamp":1496695669000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883449","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}