{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:46:51Z","timestamp":1730260011172,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ictc.2017.8191013","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T22:02:05Z","timestamp":1513288925000},"page":"406-410","source":"Crossref","is-referenced-by-count":0,"title":["Improved cryptographic model for better information security"],"prefix":"10.1109","author":[{"given":"Sunil","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Manish","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"M. K.","family":"Das","sequence":"additional","affiliation":[]},{"given":"Sanjeev","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Rajat","family":"Budhiraja","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"237","article-title":"Cryptography with dynamical systems","author":"baccara","year":"1993","journal-title":"Cellular and Cooperative systems"},{"key":"ref11","article-title":"cryptography and security systems","author":"zbigniew","year":"2014","journal-title":"CSS"},{"key":"ref12","first-page":"5427","article-title":"Modified Baptista type chaotic cryptosystem via matrix secret key","volume":"371","author":"rhouma","year":"2008","journal-title":"Physical Letters A"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1080\/0161-118991863934"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/S0375-9601(98)00086-3"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICCTICT.2016.7514653"},{"key":"ref16","first-page":"3138","article-title":"NPCR and UACI randomness tests for image encryption","author":"wu","year":"2011","journal-title":"Cyber Journals Multidisciplinary Journals in Science and Technology Journal of Selected Areas in Telecommunications (JSAT)"},{"year":"2008","author":"forouzan","journal-title":"Cryptography and Network Security","key":"ref4"},{"year":"1996","author":"menezes","journal-title":"Handbook of Applied Cryptography","key":"ref3"},{"year":"1995","author":"stinson","journal-title":"Cryptography Theory and Practice","key":"ref6"},{"year":"1994","author":"schneir","journal-title":"Applied Cryptography","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1103\/PhysRevLett.74.5028"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1103\/PhysRevLett.64.821"},{"year":"2005","author":"stallings","journal-title":"Cryptography and Network Security","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/S0375-9601(03)00122-1"},{"key":"ref9","first-page":"1041","article-title":"A Secret Key Cryptosystem Using a Chaotic Map","author":"habutsu","year":"1990","journal-title":"IEICE Trans E Japan"}],"event":{"name":"2017 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2017,10,18]]},"location":"Jeju","end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125636\/8190740\/08191013.pdf?arnumber=8191013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T23:37:46Z","timestamp":1643153866000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8191013\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ictc.2017.8191013","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}