{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:07:48Z","timestamp":1730257668895,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/icset59111.2023.10295083","type":"proceedings-article","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:52:58Z","timestamp":1698691978000},"page":"61-65","source":"Crossref","is-referenced-by-count":1,"title":["SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method)"],"prefix":"10.1109","author":[{"given":"Udai Wasmi","family":"Abboud","sequence":"first","affiliation":[{"name":"Tikrit University,College of Computer and Mathematical Sciences,Computer Sciences Department,Tikrit,Iraq"}]},{"given":"Moceheb Lazam","family":"Shuwandy","sequence":"additional","affiliation":[{"name":"Tikrit University,College of Computer and Mathematical Sciences,Computer Sciences Department,Tikrit,Iraq"}]}],"member":"263","reference":[{"key":"ref13","first-page":"136","article-title":"Switching between the AES-128 and AES-256 Using Ks * & Two Keys","volume":"10","author":"shuwandy","year":"2010","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref12","first-page":"71","article-title":"AES-128 cipher: Minimum area, low cost FPGA implementation","volume":"37","author":"liberatori","year":"2007","journal-title":"Latin American Applied Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98734-7"},{"journal-title":"CyberSecurity for the Next Generation_Asia Pacific and MEA Round 2014 Evaluating the Effect of Multi-Touch Behaviours on Android Unlock Patterns","year":"0","author":"meng","key":"ref14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSPA55076.2022.9781888"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3148537"},{"key":"ref17","first-page":"66","article-title":"Smile Mask to Capsulation MOLAZ Method","volume":"13","author":"shuwandy","year":"2013","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICITISEE.2018.8720983"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2018.8372705"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1125\/1\/012047"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.2971447"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3155810"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s17092043"},{"journal-title":"Smile Mask Development of Cryptography Performance MOLAZ Method (MOLAZ-SM)","year":"2012","author":"shuwandy","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2999533"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27668-7_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.05.014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3195676"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.031"},{"key":"ref7","first-page":"129","article-title":"Highlevel synthesis optimization of aes-128\/192\/256 encryption algorithms","volume":"29","author":"daoud","year":"2019","journal-title":"International Journal of Computers"},{"journal-title":"Applied Cryptography and Network Security","year":"2016","author":"weizhi","key":"ref9"},{"journal-title":"Novel authentication of blowing voiceless password for android smartphones using a microphone sensor Content courtesy of Springer Nature terms of use apply Rights reserved Content courtesy of Springer Nature terms of use apply Rights reserved","year":"2022","author":"shuwandy","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.006"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"184","DOI":"10.58414\/SCIENTIFICTEMPER.2023.14.1.22","article-title":"Enhanced AES-256 cipher round algorithm for IoT applications","volume":"14","author":"santhanalakshmi","year":"2023","journal-title":"The Scientific Temper"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3230820.3230824"}],"event":{"name":"2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)","start":{"date-parts":[[2023,10,2]]},"location":"Shah Alam, Malaysia","end":{"date-parts":[[2023,10,2]]}},"container-title":["2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10294331\/10295068\/10295083.pdf?arnumber=10295083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:27:15Z","timestamp":1701113235000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10295083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icset59111.2023.10295083","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}