{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T06:10:03Z","timestamp":1752300603736,"version":"3.41.2"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005710","name":"Universiti Teknologi PETRONAS, Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005710","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003093","name":"Ministry of Higher Education, Malaysia Fundamental Research Grant Scheme","doi-asserted-by":"publisher","award":["015MA0-170"],"award-info":[{"award-number":["015MA0-170"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,5]]},"DOI":"10.1109\/kse63888.2024.11063492","type":"proceedings-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T17:41:44Z","timestamp":1752255704000},"page":"392-398","source":"Crossref","is-referenced-by-count":0,"title":["Real-Time Analysis and Security Integration of Prime Generation Algorithms in Encryption Systems"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1875-6167","authenticated-orcid":false,"given":"Aliyu","family":"Garba","sequence":"first","affiliation":[{"name":"Universiti Teknologi Petronas,Computer &#x0026; Information Sciences,Perak,Malaysia"}]},{"given":"Abdullateef O.","family":"Balogun","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Petronas,Computer &#x0026; Information Sciences,Perak,Malaysia"}]},{"given":"Shamsuddeen","family":"Adamu","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Petronas,Computer &#x0026; Information Sciences,Perak,Malaysia"}]},{"given":"Hussaini","family":"Mamman","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Petronas,Computer &#x0026; Information Sciences,Perak,Malaysia"}]},{"given":"Aliyu Muhammad","family":"Kufena","sequence":"additional","affiliation":[{"name":"Ahmadu Bello University,Computer Science,Zaria,Nigeria"}]},{"given":"Ibrahim Muhammad","family":"Kurah","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Petronas,Computer &#x0026; Information Sciences,Perak,Malaysia"}]},{"given":"Saidu","family":"Yahaya","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Petronas,Computer &#x0026; Information Sciences,Perak,Malaysia"}]},{"given":"Murtala","family":"Isma'il","sequence":"additional","affiliation":[{"name":"Bayero University,Computer Science,Kano,Nigeria"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/cds52072.2021.00111"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.comcom.2020.01.033"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-981-15-0222-4_7"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/iemcon.2016.7746304"},{"volume-title":"Sieve of Eratosthenes","year":"2024","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/aicera\/icis59538.2023.10420200"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/icssit53264.2022.9716416"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/icbds58040.2023.10346581"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1063\/1.5097530"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1090\/mcom\/3438"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/icce-taiwan58799.2023.10226828"},{"volume-title":"Method for Determining Prime and Relatively Prime Numbers of 2n+k Type Based on the Periodicity Property","year":"2024","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1515\/9781400845934"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.23919\/mipro52101.2021.9597026"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.3390\/a17040157"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ecace.2019.8679358"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-0348-8295-8_10"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/icais56108.2023.10073749"}],"event":{"name":"2024 16th International Conference on Knowledge and System Engineering (KSE)","start":{"date-parts":[[2024,11,5]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2024,11,7]]}},"container-title":["2024 16th International Conference on Knowledge and System Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11063473\/11063476\/11063492.pdf?arnumber=11063492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T05:32:27Z","timestamp":1752298347000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11063492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/kse63888.2024.11063492","relation":{},"subject":[],"published":{"date-parts":[[2024,11,5]]}}}