{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T10:04:00Z","timestamp":1747649040564,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/nsyss.2015.7043532","type":"proceedings-article","created":{"date-parts":[[2015,2,20]],"date-time":"2015-02-20T15:31:32Z","timestamp":1424446292000},"page":"1-5","source":"Crossref","is-referenced-by-count":20,"title":["A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets"],"prefix":"10.1109","author":[{"given":"Sahan","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Kazi Md. Rokibul","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Habibur","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Shinsuke","family":"Tamura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.11.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.889687"},{"key":"ref10","first-page":"26","author":"fisher","year":"1948","journal-title":"Statistical Tables for Biological Agricultural and Medical Research (3rd Ed )"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70111-8"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.11.1533-1542"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_21"},{"key":"ref2","article-title":"Enhancing wireless location privacy using silent period","author":"huang","year":"2005","journal-title":"Proc IEEE Wireless Communications Networking Conference"},{"journal-title":"Java Soft","year":"2014","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"2065","DOI":"10.1541\/ieejeiss.130.2065","article-title":"An Anonymous Voting Scheme based on Confirmation Numbers","volume":"130","author":"rokibul","year":"2010","journal-title":"IEEE Trans EI"}],"event":{"name":"2015 International Conference on Networking Systems and Security (NSysS)","start":{"date-parts":[[2015,1,5]]},"location":"Dhaka, Bangladesh","end":{"date-parts":[[2015,1,7]]}},"container-title":["2015 International Conference on Networking Systems and Security (NSysS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7036195\/7042935\/07043532.pdf?arnumber=7043532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:59:36Z","timestamp":1498183176000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7043532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/nsyss.2015.7043532","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}