{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:17:55Z","timestamp":1730236675984,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1109\/iccse51940.2021.9569395","type":"proceedings-article","created":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T20:03:36Z","timestamp":1639512216000},"page":"267-269","source":"Crossref","is-referenced-by-count":0,"title":["Optimised Privacy Model for Cloud Data"],"prefix":"10.1109","author":[{"given":"Henry Chima","family":"Ukwuoma","sequence":"first","affiliation":[]},{"given":"Arome Gabriel","family":"Junior","sequence":"additional","affiliation":[]},{"given":"Aderonke","family":"Thompson","sequence":"additional","affiliation":[]},{"given":"Boniface Kayode","family":"Alese","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_15"},{"key":"ref11","article-title":"A Secured System for Internet Enabled Host Systems","volume":"5","author":"thompson","year":"2020","journal-title":"Network and Commination Technologies"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9187-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015905527"},{"key":"ref14","first-page":"53","article-title":"A Data Encryption Standard (DES) based Web Services Security Architecture","volume":"14","author":"daodu","year":"2016","journal-title":"Annals Computer Science Series"},{"key":"ref4","first-page":"250","article-title":"McBits: Fast Constant-Time Code-Based Cryptography, Cryptographic Hardware and Embedded Systems","author":"bernstein","year":"2013","journal-title":"CHES"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref6","article-title":"Post-Quantum Cystography System for Secure Electronic Voting","volume":"9","author":"gabriel","year":"2019","journal-title":"Open Computer Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1867"},{"key":"ref8","article-title":"A Secured Data Processing Technique for Effective Utilization of Cloud Computing","author":"marwan","year":"2017","journal-title":"Journal of Data Mining and Digital Humanities Special Issue on Scientific and Technological Strategic Intelligence"},{"key":"ref7","first-page":"4","article-title":"Data and databases. In: Koehne, H Developing Databases with Access","author":"summers","year":"2004","journal-title":"Nelson Australia Pty Limited"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref1","first-page":"1552","article-title":"Comparative analysis of public-key encryption schemes","volume":"2","author":"alese","year":"2012","journal-title":"International Journal of Engineering and Technology"},{"journal-title":"The top 12 password-cracking tecniques used by hackers","year":"2021","author":"walker","key":"ref9"}],"event":{"name":"2021 16th International Conference on Computer Science & Education (ICCSE)","start":{"date-parts":[[2021,8,17]]},"location":"Lancaster, United Kingdom","end":{"date-parts":[[2021,8,21]]}},"container-title":["2021 16th International Conference on Computer Science &amp; Education (ICCSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9569243\/9569247\/09569395.pdf?arnumber=9569395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:47:25Z","timestamp":1652197645000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9569395\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iccse51940.2021.9569395","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]}}}