{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:17Z","timestamp":1750306277724,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905166","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Symmetric Cryptography using Multiple Access Circular Queues (MACQ)"],"prefix":"10.1145","author":[{"given":"Sona","family":"Phull","sequence":"first","affiliation":[{"name":"Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, Uttar Pradesh"}]},{"given":"Subhranil","family":"Som","sequence":"additional","affiliation":[{"name":"Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, Uttar Pradesh"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"volume-title":"Proceedings of the World Congress on Engineering and Computer Science 2012","author":"Bhati Sunita","key":"e_1_3_2_1_1_1","unstructured":"Sunita Bhati , Anita Bhati , and S. K. Sharma , \" A New Approach towards Encryption Schemes:Byte Rotation Encryption Algorithm \", Proceedings of the World Congress on Engineering and Computer Science 2012 Sunita Bhati, Anita Bhati, and S. K. Sharma, \"A New Approach towards Encryption Schemes:Byte Rotation Encryption Algorithm\", Proceedings of the World Congress on Engineering and Computer Science 2012"},{"issue":"5","key":"e_1_3_2_1_2_1","first-page":"662","article-title":"A New Symmetric-Key Block Ciphering Algorithm","volume":"12","author":"Bani Salameh Jamal N.","year":"2012","unstructured":"Jamal N. Bani Salameh , \" A New Symmetric-Key Block Ciphering Algorithm \", Middle-East Journal of Scientific Research 12 ( 5 ): 662 -- 673 , 2012 Jamal N. Bani Salameh, \"A New Symmetric-Key Block Ciphering Algorithm\", Middle-East Journal of Scientific Research 12 (5): 662--673, 2012","journal-title":"Middle-East Journal of Scientific Research"},{"issue":"19","key":"e_1_3_2_1_3_1","first-page":"1","article-title":"3D Array Block Rotation Cipher: An Improvement using shift","volume":"11","author":"Suri Pushpa R.","unstructured":"Pushpa R. Suri , Sukhvinder Singh Deora , \" 3D Array Block Rotation Cipher: An Improvement using shift \", Global Journal of Computer Science and Technology , Volume 11 ,Issue 19 , Version 1 .0 November 2011 Pushpa R. Suri, Sukhvinder Singh Deora, \"3D Array Block Rotation Cipher: An Improvement using shift\", Global Journal of Computer Science and Technology, Volume 11,Issue 19, Version 1.0 November 2011","journal-title":"Global Journal of Computer Science and Technology"},{"issue":"5","key":"e_1_3_2_1_4_1","first-page":"1","article-title":"A Cipher based on Multiple Circular Arrays","volume":"10","author":"Suri Pushpa R.","year":"2013","unstructured":"Pushpa R. Suri , Sukhvinder Singh Deora , \" A Cipher based on Multiple Circular Arrays \", IJCSI International Journal of Computer Science Issues , Vol. 10 , Issue 5 , No 1 , September 2013 Pushpa R. Suri, Sukhvinder Singh Deora, \"A Cipher based on Multiple Circular Arrays\", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 5, No 1, September 2013","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"e_1_3_2_1_5_1","unstructured":"Rajul Kumar K.K. Mishra Ashish Tripathi Abhinav Tomar Surendra Singh \"MSEA: Modified Symmetric Encryption Algorithm\" IACR Cryptology ePrint Archive 2014  Rajul Kumar K.K. Mishra Ashish Tripathi Abhinav Tomar Surendra Singh \"MSEA: Modified Symmetric Encryption Algorithm\" IACR Cryptology ePrint Archive 2014"},{"issue":"09","key":"e_1_3_2_1_6_1","article-title":"An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms","volume":"4","author":"Mathur Akanksha","year":"2012","unstructured":"Akanksha Mathur , \" An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms \", International Journal on Computer Science and Engineering (IJCSE) ISSN: 0975-3397 Vol. 4 No. 09 Sep 2012 Akanksha Mathur, \"An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms\", International Journal on Computer Science and Engineering (IJCSE) ISSN: 0975-3397 Vol. 4 No. 09 Sep 2012","journal-title":"International Journal on Computer Science and Engineering (IJCSE)"},{"edition":"2","volume-title":"Behrouz A. Forouzan, \"Cryptography and Network Security\"","key":"e_1_3_2_1_7_1","unstructured":"Behrouz A. Forouzan, \"Cryptography and Network Security\" , 2 nd edition, McgrwaHill Edition Behrouz A. Forouzan, \"Cryptography and Network Security\", 2nd edition, McgrwaHill Edition"},{"issue":"10","key":"e_1_3_2_1_8_1","first-page":"1597","article-title":"Evolution of Encryption Techniques and Data Security Mechanisms","volume":"33","author":"John Singh K.","year":"2015","unstructured":"K. John Singh and R. Manimegalai ,, \" Evolution of Encryption Techniques and Data Security Mechanisms \", World Applied Sciences Journal 33 ( 10 ): 1597 -- 1613 , 2015 , ISSN 1818-4952,\u00a9 IDOSI Publications, 2015 K. John Singh and R. Manimegalai,, \"Evolution of Encryption Techniques and Data Security Mechanisms\", World Applied Sciences Journal 33 (10): 1597--1613, 2015, ISSN 1818-4952,\u00a9 IDOSI Publications, 2015","journal-title":"World Applied Sciences Journal"},{"key":"e_1_3_2_1_9_1","first-page":"80","article-title":"Enhanced data security approach for cloud environment based on various encryption techniques","author":"Mouhib Ibtihal","year":"2015","unstructured":"Ibtihal Mouhib , El Ouadghiri Driss , \" Enhanced data security approach for cloud environment based on various encryption techniques \", Journal of Theoretical and Applied Information Technology 31st October 2015 . Vol. 80 . No. 3 Ibtihal Mouhib, El Ouadghiri Driss, \"Enhanced data security approach for cloud environment based on various encryption techniques\", Journal of Theoretical and Applied Information Technology 31st October 2015. Vol. 80. No. 3","journal-title":"Journal of Theoretical and Applied Information Technology 31st"},{"key":"e_1_3_2_1_10_1","first-page":"114","article-title":"A Survey and Performance Analysis of Various RSA based Encryption Techniques","volume":"0975","author":"Khatarkar Sarika","unstructured":"Sarika Khatarkar , Rachana Kamble , \" A Survey and Performance Analysis of Various RSA based Encryption Techniques \", International Journal of Computer Applications ( 0975-8887 ) Volume 114 -- No. 7, March 2015 Sarika Khatarkar, Rachana Kamble, \"A Survey and Performance Analysis of Various RSA based Encryption Techniques\", International Journal of Computer Applications (0975-8887) Volume 114 -- No. 7, March 2015","journal-title":"International Journal of Computer Applications ("},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1107154"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the World Congress on Engineering and Computer Science 2015","author":"Abdelgader Abdeldime M.S.","year":"2015","unstructured":"Abdeldime M.S. Abdelgader , Lenan Wu , Mohamed Y. E. Simik and Asia Abdelmutalab, \"Design of a Secure File transfer System Using Hybrid Encryption Techniques \", Proceedings of the World Congress on Engineering and Computer Science 2015 Vol II, WCECS 2015 , October 21-23, 2015, San Francisco, USA Abdeldime M.S. Abdelgader, Lenan Wu, Mohamed Y. E. Simik and Asia Abdelmutalab, \"Design of a Secure File transfer System Using Hybrid Encryption Techniques\", Proceedings of the World Congress on Engineering and Computer Science 2015 Vol II, WCECS 2015, October 21-23, 2015, San Francisco, USA"},{"key":"e_1_3_2_1_13_1","volume-title":"Society for Design and Process Science","author":"Karki Pradeep","year":"2015","unstructured":"Pradeep Karki , Sunil R. Das , Satyendra N. Biswas , Mansour H. Assaf , Voicu Groza , Emil M. Petriu , and Scott Morton , \"Advanced encryption techniques based on S-box and ellipticalcurverevisited\", SDPS-2015 , Society for Design and Process Science , November 2015 Pradeep Karki, Sunil R.Das, Satyendra N. Biswas, Mansour H. Assaf, Voicu Groza, Emil M. Petriu, and Scott Morton, \"Advanced encryption techniques based on S-box and ellipticalcurverevisited\", SDPS-2015, Society for Design and Process Science, November 2015"},{"issue":"3","key":"e_1_3_2_1_14_1","first-page":"3033","article-title":"Comparative analysis of performance efficiency and security measures of some encryption algorithms","volume":"2","author":"Jeeva AL.","year":"2012","unstructured":"AL. Jeeva , Dr. V. Palanisamy , K. Kanagaram , \" Comparative analysis of performance efficiency and security measures of some encryption algorithms \", International Journal of Engineering Research and Applications ISSN: 2248-9622Vol. 2 , Issue 3 , May-Jun 2012 , pp. 3033 -- 3037 AL. Jeeva, Dr. V. Palanisamy, K. Kanagaram, \"Comparative analysis of performance efficiency and security measures of some encryption algorithms\", International Journal of Engineering Research and Applications ISSN: 2248-9622Vol. 2, Issue 3, May-Jun 2012, pp. 3033--3037","journal-title":"International Journal of Engineering Research and Applications"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905166","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:49Z","timestamp":1750221529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":14,"alternative-id":["10.1145\/2905055.2905166","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905166","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}