{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T09:24:37Z","timestamp":1750497877672,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377085","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Effective Modification of Play Fair Cipher with Performance Analysis using 6X6 Matrix"],"prefix":"10.1145","author":[{"given":"Maherin Mizan","family":"Maha","sequence":"first","affiliation":[{"name":"Department of Computer Science, American International University Bangladesh, Dhaka, Bangladesh"}]},{"given":"Md","family":"Masuduzzaman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University Bangladesh, Dhaka, Bangladesh"}]},{"given":"Abhijit","family":"Bhowmik","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University Bangladesh, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Fred Cohen. 1995. Introductory Information Protection (1st. ed.)."},{"key":"e_1_3_2_1_2_1","volume-title":"The Playfair Cipher","author":"Poston Howard","year":"2001","unstructured":"Howard Poston and Keshav Dhandhania. 2001. The Playfair Cipher (2001). Retrieved May 5, 2019 from https:\/\/www.commonlounge.com\/discussion\/350ac6f155ba48ecbd0fb8fd38e2f205"},{"key":"e_1_3_2_1_3_1","unstructured":"Lexico. Which Letters In The Alphabet Are Used Most Often? Retrieved from https:\/\/www.lexico.com\/en\/explore\/which-letters-are-used-most"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3351022"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.5095132"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.21817\/indjcse"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2014.7001485"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs"},{"key":"e_1_3_2_1_10_1","volume-title":"Mesran, Robbi Rahim and Andysah Putera Utama Siahaan","author":"Syahrizal Muhammad","year":"2017","unstructured":"Muhammad Syahrizal, Murdani, Surya Darma Nasution, Mesran, Robbi Rahim and Andysah Putera Utama Siahaan 2017. Modified Playfair Cipher Using Random Key Linear Congruent Method, The International Seminar: Research For Science, Technology And Culture. Vol 19 (October 2017) 25--29"},{"key":"e_1_3_2_1_11_1","volume-title":"Vimala Devi P 2017","author":"Kalaichelvi","year":"2017","unstructured":"Kalaichelvi V, Manimozhi K, Meenakshi P, Rajakumar B, Vimala Devi P 2017. An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion, International Journal of Pure and Applied Mathematics Vol 117(20) (2017), 325--330"},{"key":"e_1_3_2_1_12_1","unstructured":"Md Masuduzzaman Ashik Mahmud Anik Islam Md. Mofijul Islam \"Two Phase Authentication and VPN Based Secured Communication for IoT Home Networks\". [In Press]"},{"key":"e_1_3_2_1_13_1","unstructured":"M. Schmidt 2013. Raspberry Pi - A Quick Start Guide the Pragmatic Bookshelf"},{"key":"e_1_3_2_1_14_1","unstructured":"M. Richardson and S. Wallace 2013. Getting started with Raspberry Pi O'Reilly USA"},{"key":"e_1_3_2_1_15_1","volume-title":"1st International Conference on Electrical, Electronic and Computing Engineering. (June 2015)","author":"Maksimovi\u0107 Mirjana","year":"2015","unstructured":"Mirjana Maksimovi\u0107, Vladimir Vujovi\u0107, Nikola Davidovi\u0107, Vladimir Milo\u0161evi\u0107 and Branko Peri\u0161i\u0107 2015. Raspberry Pias Internet of Things hardware: Performances and Constraints, 1st International Conference on Electrical, Electronic and Computing Engineering. (June 2015)"},{"volume-title":"Architecting the Internet of Things","author":"Uckelmann D.","key":"e_1_3_2_1_16_1","unstructured":"D. Uckelmann, M. Harrison, F. Michahelles 2011. Architecting the Internet of Things, Springer"}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:50Z","timestamp":1750202630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":16,"alternative-id":["10.1145\/3377049.3377085","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377085","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}