{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:36:26Z","timestamp":1725413786487},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750222","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"357-362","source":"Crossref","is-referenced-by-count":0,"title":["BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security"],"prefix":"10.1109","author":[{"given":"Aditya","family":"Yulianto","sequence":"first","affiliation":[]},{"given":"S.","family":"Kom","sequence":"additional","affiliation":[]},{"given":"Maria Irmina","family":"Prasetiyowati","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Slight Paranoia How Dropbox Sacrifices User Privacy for Cost Savings","year":"2013","author":"soghoian","key":"13"},{"key":"11","article-title":"HOTP an hMAC-Based one-Time password algorithm","author":"m'raihi","year":"2005","journal-title":"Internet Tools"},{"journal-title":"Time Versus Event Based One-Time Passwords","year":"2013","author":"lindell","key":"12"},{"journal-title":"Amazon Web Services Overview of Security Processes","year":"0","key":"3"},{"journal-title":"Dropbox Is Now the Data Fabric Tying Together Devices for 100M Registered Users Who Save IB Files A Day","year":"2013","author":"constine","key":"2"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update 2012-2017","year":"2013","key":"1"},{"key":"10","first-page":"264","article-title":"One-time-password-authenticated key exchange","author":"paterson","year":"2009","journal-title":"Information Security and Privacy"},{"key":"7","first-page":"1","article-title":"Cryptography theory and practice","author":"stinson","year":"2006","journal-title":"Discrete Mathematics and Its Applications"},{"key":"6","first-page":"4","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TPSD.2008.4562749"},{"key":"4","article-title":"Serpent a proposal for the advanced encryption standard","author":"anderson","year":"1998","journal-title":"NIST AES Proposal in Press"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/92.931230"},{"key":"8","first-page":"84","article-title":"Fast implementation and fair comparison of the final candidates for advanced encryption standard using field programmable Gate Arrays","author":"gaj","year":"2001","journal-title":"Proc RSA Security Conference"}],"event":{"name":"8th International Conference for Internet Technology and Secured Transactions (ICITST 2013)","start":{"date-parts":[[2013,12,9]]},"location":"London","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750222.pdf?arnumber=6750222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T16:59:28Z","timestamp":1580921968000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6750222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750222","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}