{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:27:19Z","timestamp":1775024839663,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905208","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Automated Verification in Cryptography System"],"prefix":"10.1145","author":[{"given":"N. Immanuel","family":"Jebadurai","sequence":"first","affiliation":[{"name":"Amity Institute of Information Technology, Amity University, Noida, Uttar Pradesh, India"}]},{"given":"Himanshu","family":"Gupta","sequence":"additional","affiliation":[{"name":"Amity Institute of Information Technology, Amity University, Noida, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"issue":"7","key":"e_1_3_2_1_1_1","article-title":"E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept","volume":"2","author":"Afrin T.","year":"2013","unstructured":"T. Afrin , K. J. Satao , \" E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept \" Published in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2 , Issue 7 , July 2013 ; T. Afrin, K. J. Satao, \"E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept\" Published in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013;","journal-title":"Published in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)"},{"issue":"6","key":"e_1_3_2_1_2_1","article-title":"Role of Multiple Encryption in Secure Electronic Transaction","volume":"3","author":"Gupta H.","year":"2011","unstructured":"H. Gupta , V. K. Sharma , \" Role of Multiple Encryption in Secure Electronic Transaction \" International Journal of Network Security & Its Applications (IJNSA) , Vol. 3 , No. 6 , November 2011 H. Gupta, V. K. Sharma, \"Role of Multiple Encryption in Secure Electronic Transaction\" International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 6, November 2011","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"e_1_3_2_1_3_1","unstructured":"V. Cheval \"Automatic verification of cryptographic protocols: privacy-type properties\" pr\u00e9sent\u00e9e \u00e0 l'\u00c9cole Normale Sup\u00e9rieure de Cachan pour obtenir le grade de th\u00e8se pr\u00e9par\u00e9e au sein du Laboratoire Sp\u00e9cification et V\u00e9rification (LSV). Soutenance pr\u00e9vue le 03 d\u00e9cembre 2012.;http:\/\/www.cs.kent.ac.uk\/people\/staff\/vc218\/web\/files\/Cheval-phd12.pdf  V. Cheval \"Automatic verification of cryptographic protocols: privacy-type properties\" pr\u00e9sent\u00e9e \u00e0 l'\u00c9cole Normale Sup\u00e9rieure de Cachan pour obtenir le grade de th\u00e8se pr\u00e9par\u00e9e au sein du Laboratoire Sp\u00e9cification et V\u00e9rification (LSV). Soutenance pr\u00e9vue le 03 d\u00e9cembre 2012.;http:\/\/www.cs.kent.ac.uk\/people\/staff\/vc218\/web\/files\/Cheval-phd12.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/358699.358718"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"R. K\u00fcsters T. Truderung J. Graf \" A Framework for the Cryptographic Verification of Java-like Programs\" Technical Report https:\/\/eprint.iacr.org\/2012\/153.pdf  R. K\u00fcsters T. Truderung J. Graf \" A Framework for the Cryptographic Verification of Java-like Programs\" Technical Report https:\/\/eprint.iacr.org\/2012\/153.pdf","DOI":"10.1109\/CSF.2012.9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923410"},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"639","article-title":"Multiphase Encryption: A New Concept in Modern Cryptography","volume":"5","author":"Gupta H.","year":"2013","unstructured":"H. Gupta , V. Kumar; \" Multiphase Encryption: A New Concept in Modern Cryptography \", International Journal of Computer Theory and Engineering , Vol. 5 , No. 4 , August 2013 , PP: 639 -- 640 http:\/\/www.ijcte.org\/index.php?m=content&c=index&a=show&catid=50&id=885 H. Gupta, V. Kumar; \"Multiphase Encryption: A New Concept in Modern Cryptography\", International Journal of Computer Theory and Engineering, Vol. 5, No. 4, August 2013, PP: 639--640 http:\/\/www.ijcte.org\/index.php?m=content&c=index&a=show&catid=50&id=885","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"e_1_3_2_1_9_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/RSA (cryptosystem)  https:\/\/en.wikipedia.org\/wiki\/RSA (cryptosystem)"},{"key":"e_1_3_2_1_10_1","unstructured":"https:\/\/en.wikipedia.org\/wiki\/CRAM-MD5  https:\/\/en.wikipedia.org\/wiki\/CRAM-MD5"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India","acronym":"ICTCS '16"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":10,"alternative-id":["10.1145\/2905055.2905208","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905208","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}