{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:34:20Z","timestamp":1729672460603,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/syscon.2016.7490577","type":"proceedings-article","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T00:13:15Z","timestamp":1466122395000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Biometrie data emulation and encryption for sport wearable devices (A case study)"],"prefix":"10.1109","author":[{"given":"Nick","family":"Mcdonald","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Atkinson","sequence":"additional","affiliation":[]},{"given":"Corey","family":"Frank","sequence":"additional","affiliation":[]},{"given":"Youry","family":"Khmelevsky","sequence":"additional","affiliation":[]},{"given":"Scott","family":"McMillan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Blowfish encryption","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462888"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2694730.2694731"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2502524.2502568"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.10.32"},{"journal-title":"Advanced encryption standard (aes) definition","year":"0","author":"rouse","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2465529.2479782"},{"journal-title":"The Blowfish encryption algorithm","year":"0","author":"schneier","key":"ref17"},{"key":"ref18","first-page":"446","article-title":"A new approach towards encryption technique: D's crypto-cipher technique (dcct)","volume":"2","author":"shah","year":"2015","journal-title":"Advances in Computer Scienceand Information Technology (ACSIT)"},{"journal-title":"Advanced Encryption Standard (AES) Instructions Set","year":"0","key":"ref19"},{"journal-title":"Block Ciphers","year":"0","author":"bellare","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2786567.2794315"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714632"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4108\/icst.pervasivehealth.2013.252132"},{"key":"ref8","article-title":"New comparative study between des, 3des and aes within nine factors","volume":"2","author":"zaidan","year":"2010","journal-title":"Journal of Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2188286.2188315"},{"journal-title":"Improved advanced encryption standard (aes) crypto performance on java with nss using intel&#x00AE; aes-ni instructions","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594374"},{"journal-title":"Medical data encryption for communication over a vulnerable system","year":"2012","author":"holla","key":"ref9"},{"key":"ref20","article-title":"Performance analysis of data encryption algorithms","volume":"1","author":"tamimi","year":"2008","journal-title":"Retrieved October"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2540930.2540970"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702482"}],"event":{"name":"2016 Annual IEEE Systems Conference (SysCon)","start":{"date-parts":[[2016,4,18]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2016,4,21]]}},"container-title":["2016 Annual IEEE Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484073\/7490508\/07490577.pdf?arnumber=7490577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T23:02:18Z","timestamp":1475190138000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7490577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/syscon.2016.7490577","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}