{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:11Z","timestamp":1750221311734,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T00:00:00Z","timestamp":1511481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,24]]},"DOI":"10.1145\/3163058.3163071","type":"proceedings-article","created":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T13:15:02Z","timestamp":1516281302000},"page":"18-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Improving Security Level through Obfuscation Technique for Source Code Protection using AES Algorithm"],"prefix":"10.1145","author":[{"given":"Romi Nur","family":"Ismanto","sequence":"first","affiliation":[{"name":"Electrical Engineering Department, Universitas Indonesia"}]},{"given":"Muhammad","family":"Salman","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Universitas Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2017,11,24]]},"reference":[{"volume-title":"Tanu dan Kumar,Yogesh","year":"2015","key":"e_1_3_2_1_1_1","unstructured":"Bala , Tanu dan Kumar,Yogesh ( 2015 ). ---Asymmetric Algorithms and Symmetric Algorithms: A ReviewTannu,&Verbar; International Conference on Advancements in Engineering and Technology (ICAET 2015) Bala, Tanu dan Kumar,Yogesh (2015). ---Asymmetric Algorithms and Symmetric Algorithms: A ReviewTannu,&Verbar; International Conference on Advancements in Engineering and Technology (ICAET 2015)"},{"key":"e_1_3_2_1_2_1","volume-title":"Rump Session 34th Annu. Int. Cryptol. Conf., Adv. Cryptol. (CRYPTO).","author":"Schuldt R. L.","year":"2014","unstructured":"R. L. Rivest dan J. C. Schuldt . ( 2014 ). ---Spritz---A spongy RC4-like stream cipher and hash function,&Verbar; dalam Proc . Rump Session 34th Annu. Int. Cryptol. Conf., Adv. Cryptol. (CRYPTO). R. L. Rivest dan J. C. Schuldt. (2014). ---Spritz---A spongy RC4-like stream cipher and hash function,&Verbar; dalam Proc. Rump Session 34th Annu. Int. Cryptol. Conf., Adv. Cryptol. (CRYPTO)."},{"volume-title":"Federal Information Processing Standards 197 (26","year":"2001","key":"e_1_3_2_1_3_1","unstructured":"Advance Encryption Standard (AES). ( 2001 ). Federal Information Processing Standards 197 (26 November 2001) Advance Encryption Standard (AES). (2001). Federal Information Processing Standards 197 (26 November 2001)"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5220\/0005951302150222"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES)","author":"Panchbhai M.","year":"2016","unstructured":"M. Mohurle dan V. V. Panchbhai . ( 2016 ). \" Review on realization of AES encryption and decryption with power and area optimization \", IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES) , Delhi, India , 2016, pp. 1 -- 3 . M. Mohurle dan V. V. Panchbhai. (2016). \"Review on realization of AES encryption and decryption with power and area optimization\", IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), Delhi, India, 2016, pp. 1--3."},{"key":"e_1_3_2_1_6_1","unstructured":"Lynn Hathaway (June 2003). \"National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information&Verbar;. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/document s\/aes\/CNSS15FS.pdf  Lynn Hathaway (June 2003). \"National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information&Verbar;. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/document s\/aes\/CNSS15FS.pdf"},{"key":"e_1_3_2_1_7_1","volume-title":"Cryptography and network security: Principles and practice","author":"W.","year":"2010","unstructured":"Stallings, W. ( 2010 ). Cryptography and network security: Principles and practice ( 5 th ed.). Upper Saddle River , NJ, USA : Prentice Hall Press . Stallings, W. (2010). Cryptography and network security: Principles and practice (5th ed.). Upper Saddle River, NJ, USA: Prentice Hall Press.","edition":"5"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"---Preventing Software Piracy by Using Identity-Based Encryption and Obfuscation Techniques&Verbar","author":"Wardiana W.","year":"2009","unstructured":"W. Wardiana , ---Preventing Software Piracy by Using Identity-Based Encryption and Obfuscation Techniques&Verbar ; INKOM , pp. 1 -- 2 , 2009 . W. Wardiana, ---Preventing Software Piracy by Using Identity-Based Encryption and Obfuscation Techniques&Verbar; INKOM, pp. 1--2, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"Cable and Broadcasting Services (TELSIKS)","author":"Jevremovi\u0107 A.","year":"2013","unstructured":"A. Jevremovi\u0107 , N. Risti\u0107 dan M. Veinovi\u0107 , \"Improving protection of PHP source code using cryptology models,\" 2013 11th International Conference on Telecommunications in Modern Satellite , Cable and Broadcasting Services (TELSIKS) , Nis , 2013 A. Jevremovi\u0107, N. Risti\u0107 dan M. Veinovi\u0107, \"Improving protection of PHP source code using cryptology models,\" 2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS), Nis, 2013"},{"key":"e_1_3_2_1_10_1","volume-title":"AES and RSA Algorithm along with LSB Substitution Technique&Verbar","author":"Padmavathi B.","year":"2014","unstructured":"B. Padmavathi and S. Ranjitha Kumari , ---A Survey on Performance Analysis of DES , AES and RSA Algorithm along with LSB Substitution Technique&Verbar ; International Journal of Science and Research (IJSR), India Online ISSN : 2319--7064, 2014 B. Padmavathi and S. Ranjitha Kumari, ---A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique&Verbar; International Journal of Science and Research (IJSR), India Online ISSN: 2319--7064, 2014"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"---On the (im)possibility of obfuscating programs,&Verbar","author":"Barak B.","year":"2001","unstructured":"B. Barak , O. Goldreich , R. Impagliazzo , S. Rudich , A. Sahai , S. P. Vadhan , and K. Yang , ---On the (im)possibility of obfuscating programs,&Verbar ; in Advances in Cryptology -- CRYPTO '01, 2001 , pp. 1 -- 18 . B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. P. Vadhan, and K. Yang, ---On the (im)possibility of obfuscating programs,&Verbar; in Advances in Cryptology -- CRYPTO '01, 2001, pp. 1--18."},{"volume-title":"---Obfuscation using Encryption&Verbar","year":"2016","key":"e_1_3_2_1_12_1","unstructured":"Schneider, Johannes and Locher, Thomas , ---Obfuscation using Encryption&Verbar ; in ABB Corporate Research , Baden- Daettwil, Switzerland , 2016 Schneider, Johannes and Locher, Thomas, ---Obfuscation using Encryption&Verbar; in ABB Corporate Research, Baden-Daettwil, Switzerland, 2016"},{"key":"e_1_3_2_1_13_1","unstructured":"CIA Central Intelligence Agency ---Network Operations Division Cryptographic Requirements&Verbar; NOD Specification 001: Version 1.  CIA Central Intelligence Agency ---Network Operations Division Cryptographic Requirements&Verbar; NOD Specification 001: Version 1."}],"event":{"name":"ICCNS 2017: 2017 the 7th International Conference on Communication and Network Security","sponsor":["University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"location":"Tokyo Japan","acronym":"ICCNS 2017"},"container-title":["Proceedings of the 2017 7th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163071","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3163058.3163071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:38Z","timestamp":1750212818000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3163058.3163071"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,24]]},"references-count":13,"alternative-id":["10.1145\/3163058.3163071","10.1145\/3163058"],"URL":"https:\/\/doi.org\/10.1145\/3163058.3163071","relation":{},"subject":[],"published":{"date-parts":[[2017,11,24]]},"assertion":[{"value":"2017-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}