{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:18:08Z","timestamp":1730301488426,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/uemcon.2018.8796805","type":"proceedings-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T23:05:06Z","timestamp":1565910306000},"page":"769-772","source":"Crossref","is-referenced-by-count":1,"title":["Encryption and Decryption of Mobile Security Using AES and GOST Algorithms"],"prefix":"10.1109","author":[{"given":"Ilyas","family":"Yaqoob","sequence":"first","affiliation":[{"name":"Department of Computer Science, City University of Science and Technology, Pakistan"}]},{"given":"Talha","family":"Naqash","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University, Islamabad, Pakistan"}]},{"given":"Sajjad Hussain","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University, Islamabad, Pakistan"}]}],"member":"263","reference":[{"key":"ref8","first-page":"45","article-title":"S-box","volume":"8","author":"trenholme","year":"2010","journal-title":"AES"},{"journal-title":"Security and Cryptography for Networks","year":"2012","author":"forouzan","key":"ref7"},{"key":"ref9","first-page":"35","article-title":"Encrypting Virtual Memory","author":"provos","year":"2000","journal-title":"Proceedings of the Ninth USENIX security symposium"},{"key":"ref4","first-page":"40535","article-title":"Design and Implementation of Low Power Multistage AES S Box","volume":"10","author":"rajasekar","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"article-title":"Implementation of Cryptographic Algorithm for GSM","year":"2011","author":"sankaliya","key":"ref3"},{"key":"ref6","article-title":"Analyzing the speed of combined cryptographic algorithms with secret and public key","volume":"8","author":"idrizi","year":"0","journal-title":"International Journal of Engineering Research and Development"},{"key":"ref11","article-title":"Development and Implementation of High Speed Data Encryption Algorithm Kuznechik","volume":"4","author":"ischukova","year":"2015","journal-title":"Auditorium electronic scientific journal"},{"key":"ref5","article-title":"Another New AES Attack","author":"schneier","year":"2009","journal-title":"Schneier on Security"},{"key":"ref10","first-page":"146","article-title":"A Review on Security Issues andEncryption Algorithms in Mobile ad hoc Network","volume":"3","author":"anaut","year":"2014","journal-title":"International Journal of Science and Research"},{"key":"ref2","first-page":"193","article-title":"Customizing Cellular Message Encryption Algorithm","volume":"7","author":"mukhopadhyay","year":"2008","journal-title":"IJ Network Security"},{"key":"ref1","first-page":"204","article-title":"Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm","volume":"3","author":"das","year":"2011","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"}],"event":{"name":"2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2018,11,8]]},"location":"New York, NY, USA","end":{"date-parts":[[2018,11,10]]}},"container-title":["2018 9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8784356\/8796511\/08796805.pdf?arnumber=8796805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:21:36Z","timestamp":1677781296000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8796805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2018.8796805","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}