{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:13:33Z","timestamp":1730279613168,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwcmc.2017.7986569","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T16:38:06Z","timestamp":1500568686000},"page":"1871-1878","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight format-compliant encryption algorithm for JPEG 2000 images"],"prefix":"10.1109","author":[{"given":"Z.","family":"Fawaz","sequence":"first","affiliation":[]},{"given":"H.","family":"Noura","sequence":"additional","affiliation":[]},{"given":"A.","family":"Mostefaoui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2008.29"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.07.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2011.6116343"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5582573"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2012-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.05.050"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2012.29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2008.4632785"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.06.007"},{"key":"ref19","first-page":"235","article-title":"Error propagation in various cipher block modes","volume":"6","author":"burda","year":"2006","journal-title":"IJCSNS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/78.852023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/30.920468"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.02.013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.879919"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.03.009"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2013","author":"daemen","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.934187"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2010.06.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45184-6_16"},{"key":"ref20","article-title":"Recommendation for block cipher modes of operation. methods and techniques","author":"dworkin","year":"2001","journal-title":"DTIC Document Tech Rep"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2010.03.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.029"}],"event":{"name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2017,6,26]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7975134\/7986245\/07986569.pdf?arnumber=7986569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T11:47:23Z","timestamp":1502884043000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7986569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2017.7986569","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}