{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:08:05Z","timestamp":1748578085158,"version":"3.41.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T00:00:00Z","timestamp":1688601600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,6]]},"DOI":"10.1109\/icccnt56998.2023.10307798","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:54:40Z","timestamp":1700765680000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers"],"prefix":"10.1109","author":[{"given":"Kavin Kumar","family":"K","sequence":"first","affiliation":[{"name":"Kongu Engineering Collage,Department of Electronics and Communication Engineering,Erode,India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nandhini","family":"V D","sequence":"additional","affiliation":[{"name":"K S R Institute for Engineering and Technology,Department of Biomedical Engineering,Tiruchengode,India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kowsalya","family":"M","sequence":"additional","affiliation":[{"name":"Erode Sengunthar Engineering College,Department of Computer Science and Engineering,Thuduppathi,638057"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ragu","family":"P J","sequence":"additional","affiliation":[{"name":"K S R Institute for Engineering and Technology,Department of Biomedical Engineering,Tiruchengode,India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Raghapriya","family":"N R","sequence":"additional","affiliation":[{"name":"Erode Sengunthar Engineering College,Department of Computer Science and Engineering,Thuduppathi,638057"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maheswaran","family":"S","sequence":"additional","affiliation":[{"name":"Kongu Engineering Collage,Department of Electronics and Communication Engineering,Erode,India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"1","article-title":"Review on network security and cryptography","volume":"3","author":"Kumar","year":"2015","journal-title":"International Transaction of Electrical and Computer Engineers System"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2991\/icoposdev-17.2018.57"},{"issue":"6","key":"ref3","first-page":"2349","article-title":"Implementation of new modified MD5-512 bit algorithm for cryptography","volume":"1","author":"Walia","year":"2014","journal-title":"International Journal of Innovative Research in Advanced Engineering (IJIRAE)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2015.2427260"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2006.09.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58996-7_3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-015-0203-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5772\/9385"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60865-6_44"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EAMTA.2014.6906085"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18280\/jesa.520607"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3233\/jifs-201691"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/41164466"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1021\/acs.chemrev.8b00719"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04039-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-1116-x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024x(200102)31:2<103::aid-spe358>3.0.co;2-o"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/0272989X12454579"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0715-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18280\/ria.350310"},{"issue":"10","key":"ref22","first-page":"2789","article-title":"An efficient method for brain tumor detection using texture features and SVM classifier in MR images","volume":"19","author":"Kavinkumar","year":"2018","journal-title":"Asian Pacific journal of cancer prevention: APJCP"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0587.2013.07872.x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.07.002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3224924"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2021.3842"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1049\/rpg2.12760"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2023.033927"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7985-8_32"},{"key":"ref30","first-page":"1884","article-title":"Data Analytics and Resource Planning Using Deep Learning for Overcoming Challenges of Covid-19","author":"Anandan","year":"2021","journal-title":"Annals of the Romanian Society for Cell Biology"}],"event":{"name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2023,7,6]]},"location":"Delhi, India","end":{"date-parts":[[2023,7,8]]}},"container-title":["2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10306338\/10306339\/10307798.pdf?arnumber=10307798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T17:04:43Z","timestamp":1748538283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10307798\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icccnt56998.2023.10307798","relation":{},"subject":[],"published":{"date-parts":[[2023,7,6]]}}}