{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:55:28Z","timestamp":1729670128832,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/idaacs.2017.8095245","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T16:03:52Z","timestamp":1511885032000},"page":"1046-1050","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of enhanced SDEx method"],"prefix":"10.1109","author":[{"given":"Piotr","family":"Milczarski","sequence":"first","affiliation":[]},{"given":"Artur","family":"Hlobaz","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Podlaski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"39","article-title":"Security of measurement data transmission - modifications of the message encryption method along with concurrent hash counting","volume":"1","author":"hlobaz","year":"2008","journal-title":"FSNT NOT"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","author":"katz","year":"2014","journal-title":"Introduction to Modern Cryptography"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/sec.882"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"ref15","first-page":"19","author":"wang","year":"2005","journal-title":"How to Break MD5 and Other Hash Functions"},{"journal-title":"Technical Report","article-title":"Secure hash standard (shs)","year":"2008","key":"ref16"},{"key":"ref17","first-page":"17","author":"wang","year":"2005","journal-title":"Finding Collisions in the Full SHA-1"},{"key":"ref18","first-page":"99","author":"szydlo","year":"2006","journal-title":"Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing"},{"key":"ref19","first-page":"58","author":"rijmen","year":"2005","journal-title":"Update on SHA-l"},{"journal-title":"Electronic Frontier Foundation mobile applications report","year":"2014","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"ref6","first-page":"52","article-title":"Secure data exchange based on social networks public key distribution","author":"podlaski","year":"2015","journal-title":"Proceedings of the 2nd International Summit Internet of Things IoT Infrastructures IoT 360 2015"},{"journal-title":"The Verge","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07941-7_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19419-6_37"},{"key":"ref2","first-page":"161","article-title":"Insider threats+disruptive smart phone technology = new challenges to corporate security","volume":"8","author":"ai-haiqi","year":"2013","journal-title":"Research Journal of Applied Sciences"},{"key":"ref9","article-title":"Security of measurement data transmission - message encryption method with concurrent hash counting","author":"hlobaz","year":"0","journal-title":"SEP 1\/2007"},{"journal-title":"Krebs On Security report","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9071-0"},{"journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","year":"2010","author":"rukhin","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_96"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"3213","DOI":"10.1007\/s11042-016-3899-8","article-title":"Authorship verification applied to detection of compromised accounts on online social networks - A continuous approach","volume":"76","author":"junior","year":"2017","journal-title":"Multimedia Tools Appl"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0331-3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.47"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2479616"}],"event":{"name":"2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","start":{"date-parts":[[2017,9,21]]},"location":"Bucharest","end":{"date-parts":[[2017,9,23]]}},"container-title":["2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8086093\/8095027\/08095245.pdf?arnumber=8095245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T01:18:24Z","timestamp":1603415904000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8095245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2017.8095245","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}