{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:23:31Z","timestamp":1730298211092,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/spac46244.2018.8965585","type":"proceedings-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T02:51:08Z","timestamp":1579834268000},"page":"246-248","source":"Crossref","is-referenced-by-count":1,"title":["A File Encryption Algorithm Based on Dynamic Block Out of order Matrix Mapping"],"prefix":"10.1109","author":[{"given":"Tan","family":"Dong","sequence":"first","affiliation":[]},{"given":"YanXia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Lei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"318","article-title":"A SECURE AND EFFICIENT IMAGE ENCRYPTION ALGORITHM BASED ON DNA CODING[J]","volume":"35","author":"xiaodong","year":"2018","journal-title":"Applications of Soft Computing"},{"article-title":"A Study of Encryption Algorithms (DES, 3DES and AES) for Information Security[J]","year":"2018","author":"sivakumar","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30947-2_33"},{"key":"ref5","first-page":"2","article-title":"Impact of Random Number Generation on Parallel Genetic Algorithms[C]","author":"cicirello","year":"2018","journal-title":"Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.08.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2299\/jsp.21.233"},{"key":"ref2","first-page":"2058","article-title":"Integrating AES, DES, and 3-DES encryption algorithms for enhanced data security[J]","volume":"4","author":"singh","year":"2013","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCE.2015.130"}],"event":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2018,12,14]]},"location":"Jinan, China","end":{"date-parts":[[2018,12,17]]}},"container-title":["2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8959268\/8965430\/08965585.pdf?arnumber=8965585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T21:04:57Z","timestamp":1604091897000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8965585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/spac46244.2018.8965585","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}