{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:46:29Z","timestamp":1777704389723,"version":"3.51.4"},"reference-count":23,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T00:00:00Z","timestamp":1530144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10,27]]},"abstract":"<jats:p>The traditional algorithm does not take account of the authentication problem of terminal and server. It has poor security, heavy computation of encryption or decryption, and low efficiency. To address these problems, a new intelligent encryption algorithm for network communication parallel data of information release terminal is proposed in this paper. After users\u2019 registration, the registered ID, user password, and two random numbers are entered. The first authentication data is obtained by calculating and then transferred through a secure channel to the server for the first authentication. After the success of the identity authentication in the information release terminal and the server, the user of the information release terminal obtains the release authority. Self-inverse key matrix is generated with MapReduce parallel mechanism. Source release information data file is divided into blocks in the communication process, and each block is encrypted with key matrix. After dividing the plaintext matrix and the key matrix, the plaintext is encrypted according to the Hill encryption principle. After obtaining the ciphertext and key matrix, the plaintext is decrypted according to the principle of Hill decryption principle. Experimental results show that the proposed algorithm has high security and efficiency.<\/jats:p>","DOI":"10.3233\/jifs-169745","type":"journal-article","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T16:40:04Z","timestamp":1530290404000},"page":"4245-4255","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Intelligent encryption algorithm for network communication parallel data of information release terminal"],"prefix":"10.1177","volume":"35","author":[{"given":"Xiaohong","family":"Yang","sequence":"first","affiliation":[{"name":"Network and Information Technology Center, Lingnan Normal University, Zhanjiang, China"}]},{"given":"Donghong","family":"Yang","sequence":"additional","affiliation":[{"name":"Electronics and Information Engineering College, Guangdong Ocean University, Zhanjiang, China"}]},{"given":"S.","family":"Aue","sequence":"additional","affiliation":[{"name":"LOREAL Res and Innovat, Rue Pierre Dreyfus, F-92110 Clichy, France"}]}],"member":"179","published-online":{"date-parts":[[2018,6,28]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-1956-x"},{"issue":"12","key":"e_1_3_1_3_2","first-page":"2125","article-title":"International data encryption algorithm","volume":"60","author":"Lai X.","year":"2016","unstructured":"LaiX., International data encryption algorithm, Hepatology60(12) (2016), 2125\u20132126.","journal-title":"Hepatology"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2016.0584"},{"issue":"12","key":"e_1_3_1_5_2","first-page":"338","article-title":"Big data encryption to protect privacy data environment improvement and simulation of the algorithm","volume":"33","author":"Guo L.","year":"2016","unstructured":"GuoL., Big data encryption to protect privacy data environment improvement and simulation of the algorithm, Computer Simulation33(12) (2016), 338\u2013341.","journal-title":"Computer Simulation"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2015.12.024"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2016.2601659"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2017.3051512"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2016.12.018"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2467317"},{"issue":"6","key":"e_1_3_1_11_2","first-page":"1243","article-title":"Multi-party encryption (mpe): Secure communications in delay tolerant networks","volume":"21","author":"Cabaniss R.","year":"2016","unstructured":"CabanissR., KumarV. and MadriaS., Multi-party encryption (mpe): Secure communications in delay tolerant networks, Wireless Networks21(6) (2016), 1243\u20131258.","journal-title":"Wireless Networks"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/s150511928"},{"issue":"15","key":"e_1_3_1_13_2","first-page":"595","article-title":"Research on the application of data encryption technology in network security transmission","volume":"32","author":"Li J.","year":"2017","unstructured":"LiJ., Research on the application of data encryption technology in network security transmission, Revista De La Facultad De Ingenieria32(15) (2017), 595\u2013604.","journal-title":"Revista De La Facultad De Ingenieria"},{"issue":"21","key":"e_1_3_1_14_2","first-page":"277","article-title":"Applying encryption algorithm to enhance data security in cloud storage","volume":"23","author":"Kartit Z.","year":"2015","unstructured":"KartitZ. and MarrakiM.E., Applying encryption algorithm to enhance data security in cloud storage, Engineering Letters23(21) (2015), 277\u2013282.","journal-title":"Engineering Letters"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2119-7_106"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.11.095"},{"issue":"4","key":"e_1_3_1_17_2","first-page":"135","article-title":"Integrated geophysical investigation for pavement failure along a dual carriage way, Southwestern Nigeria: A case study","volume":"44","author":"Adesola A.M.","year":"2017","unstructured":"AdesolaA.M., AyokunleA.A. and AdebowaleA.O., Integrated geophysical investigation for pavement failure along a dual carriage way, Southwestern Nigeria: A case study, Kuwait Journal of Science44(4) (2017), 135\u2013149.","journal-title":"Kuwait Journal of Science"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720502.2016.1258837"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2016.1178933"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.3934\/dcdss.2018028"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jallcom.2016.10.188"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2018.01.096"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2017.1.00002"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2017.1.00004"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169745","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169745","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:06Z","timestamp":1777455666000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169745"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,28]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10,27]]}},"alternative-id":["10.3233\/JIFS-169745"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169745","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,28]]}}}