{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:59Z","timestamp":1750220519470,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T00:00:00Z","timestamp":1614038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,2,23]]},"DOI":"10.1145\/3457784.3457830","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T00:42:29Z","timestamp":1627692149000},"page":"238-243","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Design and Implementation a Secured and Distributed System using CBC, Socket, and RMI Technologies"],"prefix":"10.1145","author":[{"given":"Thang","family":"Duc Phung","sequence":"first","affiliation":[{"name":"FPT University, Vietnam"}]},{"given":"Thai","family":"Van Nguyen","sequence":"additional","affiliation":[{"name":"FPT University, Vietnam"}]},{"given":"Ban","family":"Quy Tran","sequence":"additional","affiliation":[{"name":"FPT University, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/net\/Socket.html [Accessed Jan 2021]  https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/net\/Socket.html [Accessed Jan 2021]"},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/rmi\/hello\/hello-world.html [Accessed Jan 2021]  https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/rmi\/hello\/hello-world.html [Accessed Jan 2021]"},{"volume-title":"AES Algorithm Submission","year":"1999","author":"Rijmen","key":"e_1_3_2_1_3_1"},{"volume-title":"Report on the Development of the Advanced Encryption Standard (AES)","year":"2000","author":"Nechvatal","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"1","author":"Taboada Guillermo","year":"2007","journal-title":"High Performance Java Sockets for Parallel Computing on Clusters."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-9128(199809\/11)10:11\/13<941::AID-CPE391>3.0.CO;2-T"},{"key":"e_1_3_2_1_7_1","unstructured":"Krishnaswamy Vijaykumar \"Efficient Implementation of Java Remote Method Invocation (RMI).\" COOTS. Vol. 98. 1998.  Krishnaswamy Vijaykumar \"Efficient Implementation of Java Remote Method Invocation (RMI).\" COOTS. Vol. 98. 1998."},{"volume-title":"5-7","year":"1998","author":"Waldo Jim","key":"e_1_3_2_1_8_1"},{"volume-title":"\"Web-based simulation in Simjava using remote method invocation.\" Proceedings of the 29th conference on Winter simulation","year":"1997","author":"Page Ernest H","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Maassen Jason \"An efficient implementation of Java's remote method invocation.\" Proceedings of the seventh ACM SIGPLAN symposium on Principles and practice of parallel programming. 1999.  Maassen Jason \"An efficient implementation of Java's remote method invocation.\" Proceedings of the seventh ACM SIGPLAN symposium on Principles and practice of parallel programming. 1999.","DOI":"10.1145\/301104.301120"},{"volume-title":"International Workshop on Fast Software Encryption. Springer","year":"2010","author":"Osvik Dag Arne","key":"e_1_3_2_1_11_1"},{"volume-title":"IEEE","year":"2006","author":"Hamalainen Panu","key":"e_1_3_2_1_12_1"},{"volume-title":"93-105","year":"2017","author":"Shadangi Vinita","key":"e_1_3_2_1_13_1"},{"volume-title":"\"Padding oracle attacks on CBC-mode encryption with secret and random IVs.\" International Workshop on Fast Software Encryption","year":"2005","author":"Yau Arnold KL","key":"e_1_3_2_1_14_1"},{"volume-title":"International Workshop on Fast Software Encryption. Springer","year":"2004","author":"Rogaway Phillip","key":"e_1_3_2_1_15_1"},{"volume-title":"Design and Analysis of AES-CBC Mode for High Security Applications","year":"2014","author":"Rabi B.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.25007\/ajnu.v9n1a550"}],"event":{"name":"ICSCA 2021: 2021 10th International Conference on Software and Computer Applications","acronym":"ICSCA 2021","location":"Kuala Lumpur Malaysia"},"container-title":["2021 10th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457784.3457830","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3457784.3457830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:38Z","timestamp":1750195478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3457784.3457830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,23]]},"references-count":17,"alternative-id":["10.1145\/3457784.3457830","10.1145\/3457784"],"URL":"https:\/\/doi.org\/10.1145\/3457784.3457830","relation":{},"subject":[],"published":{"date-parts":[[2021,2,23]]},"assertion":[{"value":"2021-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}