{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T18:23:22Z","timestamp":1774290202099,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750240","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"449-452","source":"Crossref","is-referenced-by-count":11,"title":["Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography"],"prefix":"10.1109","author":[{"given":"A.J","family":"Gabriel","sequence":"first","affiliation":[]},{"given":"B.K.","family":"Alese","sequence":"additional","affiliation":[]},{"given":"A.O.","family":"Adetunmbi","sequence":"additional","affiliation":[]},{"given":"O.S.","family":"Adewale","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","author":"schneier","year":"1996","journal-title":"Applied Cryptography Protocol Algorithms and Source Code in C"},{"key":"14","first-page":"659","volume":"16","author":"wang","year":"2009","journal-title":"Region Incrementing Visual Cryptography"},{"key":"11","author":"philemon","year":"2011","journal-title":"Comparative Nalysis of Some Public Encryption Schemes"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2010.0480"},{"key":"2","article-title":"Elliptic curve cryptography for securing cloud computing applications","volume":"66","author":"alowolodu","year":"2013","journal-title":"Lnternational Journal of Computer Applications (0975-8887)"},{"key":"1","article-title":"Comparative analysis of public-Key encryption schemes","volume":"2","author":"alese","year":"2012","journal-title":"International Journal of Engineering and Technology"},{"key":"10","article-title":"VCS a new security framework","volume":"2","author":"luthra","year":"2013","journal-title":"Journal of Engineering Computers &Applied Sciences (JEC&AS)"},{"key":"7","author":"gabriel","year":"2010","journal-title":"Design of Internet Protocol Security Filtering Rules in A Network Environment"},{"key":"6","author":"ding","year":"2006","journal-title":"Multivariate Public-Key Cryptosystems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_115"},{"key":"4","first-page":"127","article-title":"Image based steganography and cryptography","volume":"1","author":"bloisi","year":"0","journal-title":"Computer Vision Theory and Applications"},{"key":"9","article-title":"Image steganography concepts and practice","author":"kharrazi","year":"2004","journal-title":"Lecture Notes Series"},{"key":"8","first-page":"43","article-title":"A survey of steganographic techniques","author":"johnson","year":"2000","journal-title":"Proc Information Hiding"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","location":"London, United Kingdom","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750240.pdf?arnumber=6750240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:39:47Z","timestamp":1490290787000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750240","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}