{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:17:57Z","timestamp":1732771077012,"version":"3.29.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724844","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["A Critical Analysis of Key Management Techniques in Applied Cryptography"],"prefix":"10.1109","author":[{"given":"K","family":"Balaji","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidya Peetham,Department Commerce and Management,Mysuru campus"}]},{"given":"Aruna Sri","family":"Rongali","sequence":"additional","affiliation":[{"name":"University of The Cumberlands,Information Technology Emphasis\/Information Technology, Ph.D,US"}]},{"given":"Ns","family":"Archana","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidhyapeetham,Department of Commerce and Management,Mysuru campus,India"}]},{"given":"G.","family":"Sethuraman","sequence":"additional","affiliation":[{"name":"kpr college of arts science and research,department of commerce (information technology),coimbatore,641407"}]},{"given":"Jithesh Mon","family":"Mullool","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Department of Commerce and Management,Mysuru Campus,India"}]},{"given":"R.","family":"Karthi","sequence":"additional","affiliation":[{"name":"E.G.S. Pillay Engineering College,Department of Management Studies,Nagapattinam,Tamilnadu,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.54646\/bijnn.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.54646\/bijcicn.005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.54646\/bijcicn.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21917\/ijct.2022.0411"},{"issue":"1","key":"ref5","first-page":"2797","article-title":"The management and reduction of digital noise in video image processing by using transmission based noise elimination scheme","volume":"13","author":"Ramesh","year":"2022","journal-title":"ICTACT Journal on image and video processing"},{"issue":"3","key":"ref6","first-page":"1430","article-title":"An innovation for energy release of nuclear fusion at short distance dielectrics in semiconductor model","volume":"8","author":"Gopi","year":"2022","journal-title":"ICTACT Journal On Microelectronics"},{"issue":"10","key":"ref7","first-page":"6354","article-title":"The smart construction for image preprocessing of mobile robotic systems using neuro fuzzy logical system approach","volume":"20","author":"Ramesh","year":"2022","journal-title":"NeuroQuantology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5424356"},{"issue":"8","key":"ref9","first-page":"6088","article-title":"The moment probability and impacts monitoring for electron cloud behavior of electronic computers by using quantum deep learning model","volume":"20","author":"Gopi","year":"2022","journal-title":"NeuroQuantology"},{"issue":"8","key":"ref10","first-page":"5999","article-title":"The Identification of quantum effects in electronic devices based on charge transfer magnetic field model","volume":"20","author":"Gopi","year":"2022","journal-title":"NeuroQuantology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.53759\/9852\/JRS202301001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.53759\/832X\/JCIMS202301002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.53759\/7669\/jmc202303019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.53759\/5181\/JEBI202202009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.53759\/0088\/jbsha202303002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.11.011"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/en16052355"},{"key":"ref18","article-title":"Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management","volume":"23","author":"Nair","year":"2023","journal-title":"USENIX Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.58346\/JISIS.2023.I2.009"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724844.pdf?arnumber=10724844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T06:56:44Z","timestamp":1732690604000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724844","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}