{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:12:50Z","timestamp":1730279570085,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,23]]},"DOI":"10.1109\/iwbis53353.2021.9631846","type":"proceedings-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T16:32:10Z","timestamp":1640709130000},"page":"115-120","source":"Crossref","is-referenced-by-count":3,"title":["Image Transmission Using Base64 Encoding and Advanced Encryption Standard Algorithm Based on Socket Programming"],"prefix":"10.1109","author":[{"given":"Romie Oktovianus","family":"Bura","sequence":"first","affiliation":[]},{"given":"Hanum Shirotu","family":"Nida","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Implementation of Advanced Encryption Standard (AES) for Wireless Image Transmission using LabView","author":"nadzri","year":"2018","journal-title":"2018 IEEE Student Conference on Research and Development (SCOReD)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ATSIP.2016.7523055"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.15226\/2474-9257\/3\/2\/00132"},{"key":"ref13","article-title":"Analysis and Comparison between AES and DES Cryptographic Algorithm","volume":"2","author":"soni","year":"2012","journal-title":"International Journal of Engineering and Innovative Technology (IJEIT)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS48893.2020.9096809"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PACCS.2009.89"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CESYS.2016.7889934"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2015.7374133"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2017.8524573"},{"journal-title":"The Design of Rijndael AES - The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref19"},{"key":"ref4","first-page":"43","article-title":"The Concept of Big Data Analysis for Maritime Information on Indonesian Waters using K-Means Algorithm","volume":"3","author":"zen","year":"2021","journal-title":"Journal of Informatics Information System Software Engineering and Applications (INISTA)"},{"journal-title":"The Complete Cyber Security Course Volume 1 Hackers Exposed","year":"2016","author":"house","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"A Data\/Image Transmission Device Based on TCP\/IPProtocol","author":"shang","year":"2012","journal-title":"2012 8th International Conference on Wireless Communications Networking and Mobile Computing"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2005","author":"stallings","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2015.344"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICECENG.2011.6057601"},{"journal-title":"TCP\/IP Sockets in C Practical Guide for Programmers","year":"2004","author":"makofske","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IMCCC.2015.261"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4062-6_6"},{"journal-title":"Advanced Encryption Standard (AES)","first-page":"197","year":"2001","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT46704.2019.8938567"},{"key":"ref21","article-title":"Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES)","volume":"3","author":"muharram","year":"2018","journal-title":"Prosiding Seminar Nasional Ilmu Komputer dan Teknologi Informasi"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC47947.2019.9032635"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2010.31"},{"key":"ref25","first-page":"1","article-title":"A Comparative Study of Software Testing Techniques Viz. White Box Testing Black Box Testing and Grey Box Testing","volume":"ii","author":"sheakh","year":"2015","journal-title":"International Journal of Allied Practice Research and Review Website"}],"event":{"name":"2021 6th International Workshop on Big Data and Information Security (IWBIS)","start":{"date-parts":[[2021,10,23]]},"location":"Depok, Indonesia","end":{"date-parts":[[2021,10,25]]}},"container-title":["2021 6th International Workshop on Big Data and Information Security (IWBIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631759\/9631838\/09631846.pdf?arnumber=9631846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:54:10Z","timestamp":1652187250000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,23]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iwbis53353.2021.9631846","relation":{},"subject":[],"published":{"date-parts":[[2021,10,23]]}}}