{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T18:33:57Z","timestamp":1774982037841,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T00:00:00Z","timestamp":1600128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,15]]},"DOI":"10.1145\/3397391.3397423","type":"proceedings-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T20:12:03Z","timestamp":1593461523000},"page":"218-223","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Encryption and Decryption of Vital Signs Information through a Symmetric based Cryptography Algorithm"],"prefix":"10.1145","author":[{"given":"Analyn N.","family":"Yumang","sequence":"first","affiliation":[{"name":"School of EECE, Mapua University, Intramuros, Manila"}]},{"given":"Ericson D.","family":"Dimaunahan","sequence":"additional","affiliation":[{"name":"Physics Department, Mapua University, Intramuros, Manila"}]},{"suffix":"Jr.","given":"Jose B.","family":"Lazaro","sequence":"additional","affiliation":[{"name":"School of Graduate Studies, Mapua University, Intramuros, Manila"}]},{"given":"Joshua Luis T.","family":"Marinas","sequence":"additional","affiliation":[{"name":"School of EECE, Mapua University, Intramuros, Manila"}]},{"given":"John Emmanuel G.","family":"Logatoc","sequence":"additional","affiliation":[{"name":"School of EECE, Mapua University, Intramuros, Manila"}]}],"member":"320","published-online":{"date-parts":[[2020,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","author":"Sakthi Priya N.","year":"2014","unstructured":"Kamesh and N. Sakthi Priya , \"Security enhancement of authenticated RFID generation,\" Int. J. Appl. Eng. Res. , 2014 . Kamesh and N. Sakthi Priya, \"Security enhancement of authenticated RFID generation,\" Int. J. Appl. Eng. Res., 2014.","journal-title":"Int. J. Appl. Eng. Res."},{"key":"e_1_3_2_1_2_1","volume-title":"Technology Lab. Natl. Inst. Stand. ...","author":"Fips N.","year":"2001","unstructured":"N. Fips , \"197 : Announcing the advanced encryption standard (AES),\" Adv. ENCRYPTION Stand. (AES) , Technology Lab. Natl. Inst. Stand. ... , 2001 . N. Fips, \"197: Announcing the advanced encryption standard (AES),\" Adv. ENCRYPTION Stand. (AES), Technology Lab. Natl. Inst. Stand. ..., 2001."},{"key":"e_1_3_2_1_3_1","volume-title":"SAMI 2012 - Proceedings","author":"Fanfara P.","year":"2012","unstructured":"P. Fanfara , E. Dankov\u00e1 , and M. Dufala , \" Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication,\" in IEEE 10th Jubilee International Symposium on Applied Machine Intelligence and Informatics , SAMI 2012 - Proceedings , 2012 . P. Fanfara, E. Dankov\u00e1, and M. Dufala, \"Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication,\" in IEEE 10th Jubilee International Symposium on Applied Machine Intelligence and Informatics, SAMI 2012 - Proceedings, 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"ICWMC 2010","author":"Agoyi M.","year":"2010","unstructured":"M. Agoyi and D. Seral , \" SMS security: An asymmetric encryption approach,\" in Proceedings - 6th International Conference on Wireless and Mobile Communications , ICWMC 2010 , 2010 . M. Agoyi and D. Seral, \"SMS security: An asymmetric encryption approach,\" in Proceedings - 6th International Conference on Wireless and Mobile Communications, ICWMC 2010, 2010."},{"key":"e_1_3_2_1_5_1","volume-title":"Symmetric-key cryptography,\" in Information Security and Cryptography","author":"Delfs H.","year":"2015","unstructured":"H. Delfs and H. Knebl , \" Symmetric-key cryptography,\" in Information Security and Cryptography , 2015 . H. Delfs and H. Knebl, \"Symmetric-key cryptography,\" in Information Security and Cryptography, 2015."},{"key":"e_1_3_2_1_6_1","volume-title":"CSCI 2016","author":"Raigoza J.","year":"2017","unstructured":"J. Raigoza and K. Jituri , \" Evaluating Performance of Symmetric Encryption Algorithms,\" in Proceedings - 2016 International Conference on Computational Science and Computational Intelligence , CSCI 2016 , 2017 . J. Raigoza and K. Jituri, \"Evaluating Performance of Symmetric Encryption Algorithms,\" in Proceedings - 2016 International Conference on Computational Science and Computational Intelligence, CSCI 2016, 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"IBIMA","author":"Elminaam D. S. A.","year":"2009","unstructured":"D. S. A. Elminaam , H. M. A. Kader , and M. M. Hadhoud , \" Performance Evaluation of Symmetric Encryption Algorithms,\" Commun . IBIMA , 2009 . D. S. A. Elminaam, H. M. A. Kader, and M. M. Hadhoud, \"Performance Evaluation of Symmetric Encryption Algorithms,\" Commun. IBIMA, 2009."},{"key":"e_1_3_2_1_8_1","first-page":"155","volume-title":"Conf. Proceeding Ser.","author":"Samonte M. J. C.","year":"2018","unstructured":"M. J. C. Samonte , R. C. D. Mullen , J. M. P. Banaga , W. Y. Cortes , and J. A. V. Dela Calzada , \"In-patient medication delivery in mobile app and outpatient online lab results for hospitals,\" ACM Int . Conf. Proceeding Ser. , pp. 155 -- 159 , 2018 . M. J. C. Samonte, R. C. D. Mullen, J. M. P. Banaga, W. Y. Cortes, and J. A. V. Dela Calzada, \"In-patient medication delivery in mobile app and outpatient online lab results for hospitals,\" ACM Int. Conf. Proceeding Ser., pp. 155--159, 2018."},{"key":"e_1_3_2_1_9_1","volume-title":"Nanotechnology, Information Technology, Communication and Control","author":"Noche K. J. B.","year":"2018","unstructured":"K. J. B. Noche , J. F. Villaverde , and J. Lazaro , \" Portable non-invasive blood pressure measurement using pulse transmit time,\" in HNICEM 2017 - 9th International Conference on Humanoid , Nanotechnology, Information Technology, Communication and Control , Environment and Management , 2018 . K. J. B. Noche, J. F. Villaverde, and J. Lazaro, \"Portable non-invasive blood pressure measurement using pulse transmit time,\" in HNICEM 2017 - 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management, 2018."},{"key":"e_1_3_2_1_10_1","volume-title":"Monitoring of Vital Signs with Flexible and Wearable Medical Devices,\" Advanced Materials","author":"Khan Y.","year":"2016","unstructured":"Y. Khan , A. E. Ostfeld , C. M. Lochner , A. Pierre , and A. C. Arias , \" Monitoring of Vital Signs with Flexible and Wearable Medical Devices,\" Advanced Materials . 2016 . Y. Khan, A. E. Ostfeld, C. M. Lochner, A. Pierre, and A. C. Arias, \"Monitoring of Vital Signs with Flexible and Wearable Medical Devices,\" Advanced Materials. 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"Detecting vital signs with wearablewireless sensors,\" Sensors","author":"Yilmaz T.","year":"2010","unstructured":"T. Yilmaz , R. Foster , and Y. Hao , \" Detecting vital signs with wearablewireless sensors,\" Sensors . 2010 . T. Yilmaz, R. Foster, and Y. Hao, \"Detecting vital signs with wearablewireless sensors,\" Sensors. 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"Nanotechnology, Information Technology, Communication and Control","author":"Anire R. B.","year":"2018","unstructured":"R. B. Anire , F. R. G. Cruz , and I. C. Agulto , \" Environmental wireless sensor network using raspberry Pi 3 for greenhouse monitoring system,\" in HNICEM 2017 - 9th International Conference on Humanoid , Nanotechnology, Information Technology, Communication and Control , Environment and Management , 2018 . R. B. Anire, F. R. G. Cruz, and I. C. Agulto, \"Environmental wireless sensor network using raspberry Pi 3 for greenhouse monitoring system,\" in HNICEM 2017 - 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management, 2018."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"G. J. Simmons \"Symmetric and Asymmetric Encryption \" ACM Comput. Surv. 1979.  G. J. Simmons \"Symmetric and Asymmetric Encryption \" ACM Comput. Surv. 1979.","DOI":"10.1145\/356789.356793"},{"key":"e_1_3_2_1_14_1","volume-title":"Ciphertext-policy attribute-based encryption,\" in Proceedings - IEEE Symposium on Security and Privacy","author":"Bethencourt J.","year":"2007","unstructured":"J. Bethencourt , A. Sahai , and B. Waters , \" Ciphertext-policy attribute-based encryption,\" in Proceedings - IEEE Symposium on Security and Privacy , 2007 . J. Bethencourt, A. Sahai, and B. Waters, \"Ciphertext-policy attribute-based encryption,\" in Proceedings - IEEE Symposium on Security and Privacy, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985949"}],"event":{"name":"ICBET 2020: 2020 10th International Conference on Biomedical Engineering and Technology","location":"Tokyo Japan","acronym":"ICBET 2020"},"container-title":["Proceedings of the 2020 10th International Conference on Biomedical Engineering and Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397391.3397423","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397391.3397423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:32Z","timestamp":1750200092000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397391.3397423"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,15]]},"references-count":15,"alternative-id":["10.1145\/3397391.3397423","10.1145\/3397391"],"URL":"https:\/\/doi.org\/10.1145\/3397391.3397423","relation":{},"subject":[],"published":{"date-parts":[[2020,9,15]]},"assertion":[{"value":"2020-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}