{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:34:30Z","timestamp":1725734070962},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T00:00:00Z","timestamp":1702857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,18]]},"DOI":"10.1109\/icsc58660.2023.10449816","type":"proceedings-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T19:00:33Z","timestamp":1709578833000},"page":"938-942","source":"Crossref","is-referenced-by-count":0,"title":["Security Measures for Ensuring Confidentiality of Information Using Encryption by Elliptic Curve with Precomputation"],"prefix":"10.1109","author":[{"given":"Fatimah Dawoud","family":"Mousay","sequence":"first","affiliation":[{"name":"The Libyan Academy,Department of Mathematics,Benghazi,Libya"}]},{"given":"Souad I.","family":"Mugassabi","sequence":"additional","affiliation":[{"name":"University of Benghazi,Department of Mathematics,Benghazi,Libya"}]},{"given":"Asma Ail","family":"Budalal","sequence":"additional","affiliation":[{"name":"Department of Communication Technology, College of Electrical and Electronic Engineering Technology,Benghazi,Libya"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.58425\/ajt.v2i1.134"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/WiMOB.2017.8115820"},{"volume-title":"Computer security handbook","year":"2014","author":"Seymour","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.promfg.2019.02.215"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1201\/9781439821916.ch1"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1109\/IEEE.EDGE.2017.47","article-title":"The many faces of end-to-end encryption and their security analysis","volume-title":"IEEE international conference on edge computing (EDGE)","author":"Nabeel","year":"2017"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/IBCAST.2018.8312262"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICASID.2017.8285751"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.3390\/s21010067"},{"key":"ref10","article-title":"2018 7th International Conference on Reliability","volume-title":"Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","author":"Hussain","year":"2019"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.32604\/iasc.2023.028548"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.5120\/18890-0172"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.11591\/ijece.v11i2.pp1293-1302"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.3923\/itj.2005.132.139"},{"volume-title":"Applied cryptography and data security","year":"2005","author":"Christof","key":"ref15"},{"volume-title":"Pohlig-hellman applied in elliptic curve cryptography","year":"2015","author":"Sommerseth","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1201\/9781420071474"},{"volume-title":"Elementary number theory with applications","year":"2002","author":"Koshy","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1090\/stml\/058"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/3-540-48059-5_27"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1155\/2021\/6633925"}],"event":{"name":"2023 IEEE 11th International Conference on Systems and Control (ICSC)","start":{"date-parts":[[2023,12,18]]},"location":"Sousse, Tunisia","end":{"date-parts":[[2023,12,20]]}},"container-title":["2023 IEEE 11th International Conference on Systems and Control (ICSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10449691\/10449692\/10449816.pdf?arnumber=10449816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T01:35:42Z","timestamp":1709861742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10449816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,18]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icsc58660.2023.10449816","relation":{},"subject":[],"published":{"date-parts":[[2023,12,18]]}}}