{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:59Z","timestamp":1750307579092,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656091","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"912-917","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Collect and broadcast news in security"],"prefix":"10.1145","author":[{"given":"Heng-Sheng","family":"Chen","sequence":"first","affiliation":[{"name":"Chinese Culture University, Yang-Ming-San, Taipei, Taiwan"}]},{"given":"Tsang-Yean","family":"Lee","sequence":"additional","affiliation":[{"name":"Chinese Culture University, Yang-Ming-San, Taipei, Taiwan"}]},{"given":"Huey-Ming","family":"Lee","sequence":"additional","affiliation":[{"name":"Chinese Culture University, Yang-Ming-San, Taipei, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"volume-title":"Differential Cryptanalysis of DES-like Cryptosystem. Advances in Cryptology-CRYPTO '90 Proceedings, Springer-Verlag Berlin, 2--21","author":"Biham E.","key":"e_1_3_2_1_1_1","unstructured":"Biham E. and Shamir A . 1991 . Differential Cryptanalysis of DES-like Cryptosystem. Advances in Cryptology-CRYPTO '90 Proceedings, Springer-Verlag Berlin, 2--21 . Biham E. and Shamir A. 1991. Differential Cryptanalysis of DES-like Cryptosystem. Advances in Cryptology-CRYPTO '90 Proceedings, Springer-Verlag Berlin, 2--21."},{"volume-title":"Cryptography and Data Security","author":"Denning D.","key":"e_1_3_2_1_2_1","unstructured":"Denning , D. 1982. Cryptography and Data Security , Addison-Wesley . Denning, D. 1982. Cryptography and Data Security, Addison-Wesley."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 11Th WSEAS International Conference on System (CSCC'07)","author":"Lee H.-M.","year":"2007","unstructured":"Lee , H.-M. , Lee , T.-Y. , Lin , L. , Su , J.-S. 2007 . Cipher text containing data and key to be transmitted in network security . In Proceedings of the 11Th WSEAS International Conference on System (CSCC'07) (Agios Nikolaos, Crete Island, Greece July 23--28 , 2007), 275--279. Lee, H.-M., Lee, T.-Y., Lin, L., Su, J.-S. 2007. Cipher text containing data and key to be transmitted in network security. In Proceedings of the 11Th WSEAS International Conference on System (CSCC'07) (Agios Nikolaos, Crete Island, Greece July 23--28, 2007), 275--279."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2007.166"},{"key":"e_1_3_2_1_6_1","volume-title":"Issue 12","volume":"3","author":"Lee T.-Y.","year":"2006","unstructured":"Lee , T.-Y. , Lee , H.-M. 2006 . Encryption and decryption algorithm of data transmission in network security. WSEAS Transactions on Information Science and Applications , Issue 12 , Volume 3 , 2557--2562. Lee, T.-Y., Lee, H.-M. 2006. Encryption and decryption algorithm of data transmission in network security. WSEAS Transactions on Information Science and Applications, Issue 12, Volume 3, 2557--2562."},{"volume-title":"Jet Propulsion Laboratory","author":"McEliece R. J.","key":"e_1_3_2_1_7_1","unstructured":"McEliece , R. J. 1978. A Public-Key System Based on Algebraic Coding Theory, 114--116. Deep Sace Network Progress Report, 44 , Jet Propulsion Laboratory , California Institute of Technology . McEliece, R. J. 1978. A Public-Key System Based on Algebraic Coding Theory, 114--116. Deep Sace Network Progress Report, 44, Jet Propulsion Laboratory, California Institute of Technology."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705061"},{"key":"e_1_3_2_1_9_1","volume-title":"NBS FIPS PUB 46: Data Encryption Standard","author":"National Bureau of Standards 1977.","year":"1977","unstructured":"National Bureau of Standards 1977. NBS FIPS PUB 46: Data Encryption Standard , National Bureau of Standards, U. S. A. Department of Commerce , ( Jan. 1977 ). National Bureau of Standards 1977. NBS FIPS PUB 46: Data Encryption Standard, National Bureau of Standards, U. S. A. Department of Commerce, (Jan. 1977)."},{"key":"e_1_3_2_1_10_1","volume-title":"NBS FIPS PUB 81: Data Modes of Operation","author":"National Bureau of Standards, 1980.","year":"1980","unstructured":"National Bureau of Standards, 1980. NBS FIPS PUB 81: Data Modes of Operation , National Bureau of Standards, U. S. Department of Commerce , ( Jan. 1980 ). National Bureau of Standards, 1980. NBS FIPS PUB 81: Data Modes of Operation, National Bureau of Standards, U. S. Department of Commerce, (Jan. 1980)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.180","volume-title":"FIPS PUB 180: Secure Hash Standard (SHS), (May 11","author":"National Institute of Standards and Technology (NIST) 1993.","year":"1993","unstructured":"National Institute of Standards and Technology (NIST) 1993. FIPS PUB 180: Secure Hash Standard (SHS), (May 11 , 1993 ). National Institute of Standards and Technology (NIST) 1993. FIPS PUB 180: Secure Hash Standard (SHS), (May 11, 1993)."},{"key":"e_1_3_2_1_12_1","volume-title":"Escrowed Encryption Standard, (February","author":"National Institute of Standards and Technology (NIST)","year":"1994","unstructured":"National Institute of Standards and Technology (NIST) 1994 . NIST FIPS PUB 185 , Escrowed Encryption Standard, (February 1994). National Institute of Standards and Technology (NIST) 1994. NIST FIPS PUB 185, Escrowed Encryption Standard, (February 1994)."},{"volume-title":"Fundamentals of Computer Security","author":"Pieprzyk J.","key":"e_1_3_2_1_13_1","unstructured":"Pieprzyk , J. , Hardjono , T. , Seberry , J. 2003. Fundamentals of Computer Security , Springer-Verlag Berlin Heidelberg . Pieprzyk, J., Hardjono, T., Seberry, J. 2003. Fundamentals of Computer Security, Springer-Verlag Berlin Heidelberg."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"volume-title":"International Edition","author":"Stallings W.","key":"e_1_3_2_1_15_1","unstructured":"Stallings , W. 2003 , Cryptography and Network Security: Principles and Practices , International Edition , Third Edition by Pearson Education, Inc. Upper Saddle River, NJ 07458. Stallings, W. 2003, Cryptography and Network Security: Principles and Practices, International Edition, Third Edition by Pearson Education, Inc. Upper Saddle River, NJ 07458."},{"volume-title":"Network Security Essentials Application and Standards","author":"Stallings W.","key":"e_1_3_2_1_16_1","unstructured":"Stallings , W. 2003. Network Security Essentials Application and Standards , Second Edition by Pearson Education, Inc. Upper Saddle River, NJ 0745. Stallings, W. 2003. Network Security Essentials Application and Standards, Second Edition by Pearson Education, Inc. Upper Saddle River, NJ 0745."}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:13Z","timestamp":1750250473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":16,"alternative-id":["10.1145\/1655925.1656091","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656091","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}