{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T20:59:50Z","timestamp":1762376390486},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/icit.2018.8352407","type":"proceedings-article","created":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T17:34:26Z","timestamp":1525455266000},"page":"1526-1531","source":"Crossref","is-referenced-by-count":3,"title":["Speech encryption using generalized modified chaotic logistic and tent maps"],"prefix":"10.1109","author":[{"given":"Wafaa S.","family":"Sayed","sequence":"first","affiliation":[]},{"given":"Mohammed F.","family":"Tolba","sequence":"additional","affiliation":[]},{"given":"Ahmed G.","family":"Radwan","sequence":"additional","affiliation":[]},{"given":"Salwa K.","family":"Abd-El-Hafiz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"1","article-title":"A chaotic encryption scheme for real-time embedded systems: design and implementation","author":"pande","year":"2013","journal-title":"Telecommunication Systems"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1201\/9781420065282","author":"lian","year":"2008","journal-title":"Multimedia Content Encryption Techniques and Applications"},{"journal-title":"ITU-T Test Signals for Telecommunication Systems Test vectors associated to Rec ITU-T P 501","year":"0","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-010-9877-1"},{"key":"ref11","article-title":"Symmetric encryption algorithms using chaotic and non-chaotic generators: A review","author":"radwan","year":"2015","journal-title":"Journal of Advanced Research"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.12.018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2013.6815499"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/586783"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3030-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2015.7416349"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2147-3"}],"event":{"name":"2018 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2018,2,20]]},"location":"Lyon","end":{"date-parts":[[2018,2,22]]}},"container-title":["2018 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8342303\/8352140\/08352407.pdf?arnumber=8352407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T14:24:23Z","timestamp":1571322263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8352407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icit.2018.8352407","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}