{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:17Z","timestamp":1750221077598,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T00:00:00Z","timestamp":1546041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,29]]},"DOI":"10.1145\/3301551.3301603","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"214-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Advanced Encryption Standard-Butterfly Effect in Protecting Image of Copyright Piracy"],"prefix":"10.1145","author":[{"given":"Hidear","family":"Talirongan","sequence":"first","affiliation":[{"name":"Technological Institute of the Philippines, Graduate Program, Quezon City, Philippines"}]},{"given":"Ariel M.","family":"Sison","sequence":"additional","affiliation":[{"name":"School of Computer Studies, Emilio Aguinaldo College, Manila, Philippines"}]},{"given":"Ruji P.","family":"Medina","sequence":"additional","affiliation":[{"name":"Technological Institute of the Philippines, Graduate Program, Quezon City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"et al","author":"Aleiner I.L.","year":"2016","unstructured":"Aleiner , I.L. et al . 2016 . waves. (2016). Aleiner, I.L. et al. 2016. waves. (2016)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.02.04"},{"key":"e_1_3_2_1_3_1","first-page":"88","article-title":"Computer and Network Security","volume":"3","author":"Avi Kak","year":"2017","unstructured":"Avi Kak 2017 . \" Computer and Network Security .\" Purdue University. 3 (2017), 88 . Avi Kak 2017. \"Computer and Network Security.\" Purdue University. 3 (2017), 88.","journal-title":"Purdue University."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_17"},{"key":"e_1_3_2_1_5_1","volume-title":"Universal Charge Diffusion and the Butterfly Effect. 1, 3","author":"Blake M.","year":"2016","unstructured":"Blake , M. 2016. Universal Charge Diffusion and the Butterfly Effect. 1, 3 ( 2016 ), 1--7. Blake, M. 2016. Universal Charge Diffusion and the Butterfly Effect. 1, 3 (2016), 1--7."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_7_1","volume-title":"Android Fuzzy Keyword Search In Encrypted Data Over Cloud. 2, 11","author":"Chutel P.","year":"2015","unstructured":"Chutel , P. 2015. Android Fuzzy Keyword Search In Encrypted Data Over Cloud. 2, 11 ( 2015 ), 238--240. Chutel, P. 2015. Android Fuzzy Keyword Search In Encrypted Data Over Cloud. 2, 11 (2015), 238--240."},{"key":"e_1_3_2_1_8_1","first-page":"975","article-title":"Symmetric Algorithm Survey","volume":"61","author":"Ebrahim M.","year":"2013","unstructured":"Ebrahim , M. 2013 . Symmetric Algorithm Survey : A Comparative Analysis. International Journal of Computer Applications. 61 , 20 (2013), 975 -- 8887 . Ebrahim, M. et al. 2013. Symmetric Algorithm Survey: A Comparative Analysis. International Journal of Computer Applications. 61, 20 (2013), 975--8887.","journal-title":"A Comparative Analysis. International Journal of Computer Applications."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.01.004"},{"key":"e_1_3_2_1_10_1","unstructured":"Gharibi W. 2011. Studying and Classification of the Most Significant Malicious Software. arXiv preprint arXiv:1106.0853. (2011) 1--5.  Gharibi W. 2011. Studying and Classification of the Most Significant Malicious Software. arXiv preprint arXiv:1106.0853. (2011) 1--5."},{"key":"e_1_3_2_1_11_1","first-page":"71","article-title":"A Study of Public Key Encryption with Keyword Search","volume":"15","author":"Hsu S.-T.","year":"2013","unstructured":"Hsu , S.-T. 2013 . A Study of Public Key Encryption with Keyword Search . IJ Network Security. 15 , 2 (2013), 71 -- 79 . Hsu, S.-T. et al. 2013. A Study of Public Key Encryption with Keyword Search. IJ Network Security. 15, 2 (2013), 71--79.","journal-title":"IJ Network Security."},{"key":"e_1_3_2_1_12_1","volume-title":"et al","author":"Jones K.H.","year":"2014","unstructured":"Jones , K.H. et al . 2014 . A case study of the secure anonymous information linkage (SAIL) gateway: A privacy-protecting remote access system for health-related research and evaluation. Journal of Biomedical Informatics . 50, (2014), 196--204. Jones, K.H. et al. 2014. A case study of the secure anonymous information linkage (SAIL) gateway: A privacy-protecting remote access system for health-related research and evaluation. Journal of Biomedical Informatics. 50, (2014), 196--204."},{"key":"e_1_3_2_1_13_1","article-title":"Applying Encryption Algorithm to Enhance Data Security in Cloud Storage","volume":"23","author":"Kartit Z.","year":"2015","unstructured":"Kartit , Z. 2015 . Applying Encryption Algorithm to Enhance Data Security in Cloud Storage . IAENG Engineering Letters. 23 , 4 (2015). Kartit, Z. et al. 2015. Applying Encryption Algorithm to Enhance Data Security in Cloud Storage. IAENG Engineering Letters. 23, 4 (2015).","journal-title":"IAENG Engineering Letters."},{"key":"e_1_3_2_1_14_1","unstructured":"Kumar A. and Tewari R.R. 2017. Expansion of Round Key Generations in Advanced Encryption Standard for Secure Communication. 13 7 (2017) 1679--1698.  Kumar A. and Tewari R.R. 2017. Expansion of Round Key Generations in Advanced Encryption Standard for Secure Communication. 13 7 (2017) 1679--1698."},{"key":"e_1_3_2_1_15_1","volume-title":"et al","author":"Lo H.-K.","year":"2015","unstructured":"Lo , H.-K. et al . 2015 . Secure Quantum Key Distribution . (2015), 1--13. Lo, H.-K. et al. 2015. Secure Quantum Key Distribution. (2015), 1--13."},{"key":"e_1_3_2_1_16_1","first-page":"975","article-title":"A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security","volume":"67","author":"Mahajan P.","year":"2013","unstructured":"Mahajan , P. and Sachdeva , A. 2013 . A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security . International Journal of Computer Applications. 67 , 19 (2013), 975 -- 8887 . Mahajan, P. and Sachdeva, A. 2013. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67, 19 (2013), 975--8887.","journal-title":"International Journal of Computer Applications."},{"key":"e_1_3_2_1_17_1","volume-title":"et al","author":"Manjunath C.R.","year":"2014","unstructured":"Manjunath , C.R. et al . 2014 . Secure Transmission in MANET and Wireless Sensor Network . (2014), 9415--9418. Manjunath, C.R. et al. 2014. Secure Transmission in MANET and Wireless Sensor Network. (2014), 9415--9418."},{"key":"e_1_3_2_1_18_1","volume-title":"et al","author":"Mills J.","year":"2015","unstructured":"Mills , J. et al . 2015 . On self-compassion and self-care in nursing Selfish or essential for compassionate care. Mills, J. et al. 2015. On self-compassion and self-care in nursing Selfish or essential for compassionate care."},{"key":"e_1_3_2_1_19_1","volume-title":"et al","author":"Mohammad O.","year":"2015","unstructured":"Mohammad , O. et al . 2015 . Innovative Method for enhancing Key generation and management in the AES-algorithm. arXiv preprint arXiv: .... March (2015), 14--20. Mohammad, O. et al. 2015. Innovative Method for enhancing Key generation and management in the AES-algorithm. arXiv preprint arXiv: .... March (2015), 14--20."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2031651"},{"key":"e_1_3_2_1_21_1","volume-title":"et al","author":"Pachori V.","year":"2012","unstructured":"Pachori , V. et al . 2012 . Improved Performance of Advance Encryption Standard using Parallel Computing . 2, 1 (2012), 967--971. Pachori, V. et al. 2012. Improved Performance of Advance Encryption Standard using Parallel Computing. 2, 1 (2012), 967--971."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.108"},{"key":"e_1_3_2_1_23_1","volume-title":"et al","author":"Purcell K.","year":"2012","unstructured":"Purcell , K. et al . 2012 . Search Engine Use 2012. PEW Research Center . February (2012), 42. Purcell, K. et al. 2012. Search Engine Use 2012. PEW Research Center. February (2012), 42."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Raab K. 2014. Mindfulness selfcompassion and empathy among health care professionals a review of the literature.  Raab K. 2014. Mindfulness selfcompassion and empathy among health care professionals a review of the literature.","DOI":"10.1080\/08854726.2014.913876"},{"key":"e_1_3_2_1_25_1","volume-title":"et al","author":"Roberts D.A..","year":"2015","unstructured":"Roberts , D.A.. et al . 2015 . localized shocks. Roberts, D.A.. et al. 2015. localized shocks."},{"key":"e_1_3_2_1_26_1","unstructured":"Roberts D.A. and Stanford D. 2014. Two-dimensional conformal field theory and the. (2014).  Roberts D.A. and Stanford D. 2014. Two-dimensional conformal field theory and the. (2014)."},{"key":"e_1_3_2_1_27_1","unstructured":"Roberts D.A. and Swingle B. 2016. Lieb-Robinson and the butterfly effect. 0 (2016) 1--10.  Roberts D.A. and Swingle B. 2016. Lieb-Robinson and the butterfly effect. 0 (2016) 1--10."},{"key":"e_1_3_2_1_28_1","volume-title":"2015 4th International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2015.","author":"Saini N.","year":"2015","unstructured":"Saini , N. et al. 2015. Enhancement of security using cryptographic techniques . 2015 4th International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2015. ( 2015 ), 1--5. Saini, N. et al. 2015. Enhancement of security using cryptographic techniques. 2015 4th International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2015. (2015), 1--5."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0217-4"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.003"},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Advanced encryption standard","volume":"197","author":"Selent D.","year":"2010","unstructured":"Selent , D. 2010 . Advanced encryption standard . Federal Information Processing Standard, FIPS-197. 197, Fips 197 (2010), 1 -- 10 . Selent, D. 2010. Advanced encryption standard. Federal Information Processing Standard, FIPS-197. 197, Fips 197 (2010), 1--10.","journal-title":"Federal Information Processing Standard, FIPS-197. 197, Fips"},{"key":"e_1_3_2_1_32_1","unstructured":"Seth S.M. and Mishra R. 2011. Comparative Analysis Of Encryption Algorithms For Data Communication. 4333 (2011) 292--294.  Seth S.M. and Mishra R. 2011. Comparative Analysis Of Encryption Algorithms For Data Communication. 4333 (2011) 292--294."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Shenker S.H.. and Stanford D. 2015. stringy effects in scrambling.  Shenker S.H.. and Stanford D. 2015. stringy effects in scrambling.","DOI":"10.1007\/JHEP05(2015)132"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5120\/11507-7224"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.07.007"},{"key":"e_1_3_2_1_36_1","first-page":"12","article-title":"Toward a legitimacy-based view of political risk: the cae of Google and Yahoo in China","volume":"127","author":"Stevens C.E.","year":"2015","unstructured":"Stevens , C.E. 2015 . Toward a legitimacy-based view of political risk: the cae of Google and Yahoo in China . Strategic Management Journal. 127 , 1 (2015), 12 -- 13 . Stevens, C.E. et al. 2015. Toward a legitimacy-based view of political risk: the cae of Google and Yahoo in China. Strategic Management Journal. 127, 1 (2015), 12--13.","journal-title":"Strategic Management Journal."},{"key":"e_1_3_2_1_37_1","first-page":"1302","article-title":"A Study on Data Encryption Using AES and RSA","volume":"5","author":"Sultana F.","year":"2017","unstructured":"Sultana , F. 2017 . A Study on Data Encryption Using AES and RSA . International Journal of Innovative Research in Computer and Communication Engineering. 5 , 2 (2017), 1302 -- 1309 . Sultana, F. et al. 2017. A Study on Data Encryption Using AES and RSA. International Journal of Innovative Research in Computer and Communication Engineering. 5, 2 (2017), 1302--1309.","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering."},{"key":"e_1_3_2_1_38_1","unstructured":"Thao 2018. nvthaovn\/CompareImage (Thao). {online}.  Thao 2018. nvthaovn\/CompareImage (Thao). {online}."},{"key":"e_1_3_2_1_39_1","article-title":"Cloud Computing Security Issues","volume":"2","author":"Tiwari P.K.","year":"2012","unstructured":"Tiwari , P.K. and Mishra , B. 2012 . Cloud Computing Security Issues , Challenges and Solution. International Journal of Emerging Technology and Advanced Engineering. 2 , 8 (2012), Aug. Tiwari, P.K. and Mishra, B. 2012. Cloud Computing Security Issues, Challenges and Solution. International Journal of Emerging Technology and Advanced Engineering. 2, 8 (2012), Aug.","journal-title":"Challenges and Solution. International Journal of Emerging Technology and Advanced Engineering."},{"key":"e_1_3_2_1_40_1","unstructured":"Trang H. 2012. An efficient FPGA implementation of the Advanced Encryption Standard algorithm. (2012) 5--8.  Trang H. 2012. An efficient FPGA implementation of the Advanced Encryption Standard algorithm. (2012) 5--8."},{"key":"e_1_3_2_1_41_1","unstructured":"Wang Y. and Yang X. 2012. New Methods of AES Key Expansion. Imaging.  Wang Y. and Yang X. 2012. New Methods of AES Key Expansion. Imaging."},{"key":"e_1_3_2_1_42_1","first-page":"237","article-title":"Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy","volume":"5","author":"Wijayanto H.","year":"2016","unstructured":"Wijayanto , H. 2016 . Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy . International Journal of Research in Computer and Communication Technology. 5 , 5 (2016), 237 -- 242 . Wijayanto, H. et al. 2016. Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy. International Journal of Research in Computer and Communication Technology. 5, 5 (2016), 237--242.","journal-title":"International Journal of Research in Computer and Communication Technology."},{"key":"e_1_3_2_1_43_1","volume-title":"et al","author":"Wiklund L.","year":"2012","unstructured":"Wiklund , L. et al . 2012 . The butterfly effect of caring - clinical nursing teachers ' understanding of self-compassion as a source to compassionate care. (2012). Wiklund, L. et al. 2012. The butterfly effect of caring - clinical nursing teachers ' understanding of self-compassion as a source to compassionate care. (2012)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"e_1_3_2_1_45_1","volume-title":"The Application of Data Mining Technology in Computer Network Security. 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation.","author":"Xiao-Li M.","year":"2015","unstructured":"Xiao-Li , M. and Xiao-Lei , Z . 2015 . The Application of Data Mining Technology in Computer Network Security. 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation. ( 2015 ), 1126--1129. Xiao-Li, M. and Xiao-Lei, Z. 2015. The Application of Data Mining Technology in Computer Network Security. 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation. (2015), 1126--1129."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Yan J. and Chen F. 2016. An Improved AES Key Expansion Algorithm. Icemie (2016) 113--116.  Yan J. and Chen F. 2016. An Improved AES Key Expansion Algorithm. Icemie (2016) 113--116.","DOI":"10.2991\/icemie-16.2016.28"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"}],"event":{"name":"ICIT 2018: IoT and Smart City","sponsor":["The Hong Kong Polytechnic The Hong Kong Polytechnic University","TU Tianjin University"],"location":"Hong Kong Hong Kong","acronym":"ICIT 2018"},"container-title":["Proceedings of the 6th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301551.3301603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:35Z","timestamp":1750208255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301551.3301603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,29]]},"references-count":47,"alternative-id":["10.1145\/3301551.3301603","10.1145\/3301551"],"URL":"https:\/\/doi.org\/10.1145\/3301551.3301603","relation":{},"subject":[],"published":{"date-parts":[[2018,12,29]]},"assertion":[{"value":"2018-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}