iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/ISBA.2016.7477242
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:09:05Z","timestamp":1729634945899,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/isba.2016.7477242","type":"proceedings-article","created":{"date-parts":[[2016,5,26]],"date-time":"2016-05-26T20:26:45Z","timestamp":1464294405000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Linebased end-to-display encryption for secure documents"],"prefix":"10.1109","author":[{"given":"Sebastian","family":"Burg","sequence":"first","affiliation":[]},{"given":"Pranav","family":"Channakeshava","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Bringmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"2015 state of the endpoint report User-centric risk Ponemon Institute LLC","first-page":"1","year":"2015","author":"llc","key":"ref10"},{"key":"ref11","first-page":"2","article-title":"Counter mode security: Analysis and recommendations","author":"mcgrew","year":"2002","journal-title":"Cisco Systems November"},{"key":"ref12","first-page":"3","article-title":"Hybrid Cryptography by the implementation of RSA and AES","volume":"3","author":"palanisamy","year":"2011","journal-title":"Internation Journal of Current Research"},{"key":"ref13","first-page":"62","article-title":"FPGA Implementation for Real Time Encryption Engine for Real Time Video","volume":"2","author":"patil","year":"2010","journal-title":"Proceedings of the 14th WSEAS International Conference on Circuits ICC'10"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"first-page":"2","article-title":"Gesicherter Dateneingabe-dialog mittels visueller Kryptographie","year":"2005","author":"staring","key":"ref15"},{"journal-title":"cybergeddon der deutschen wirtschaft durch nsa & co ? Corporate Trust","first-page":"1","year":"2014","author":"trust","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2756601.2756613"},{"key":"ref3","first-page":"2","article-title":"Verfahren und System zur bidirektionalen, abhor- und ma-nipulationssicheren Ubertragung von Informationen tiberein Netzwerk sowie Dekodiereinheit","author":"borchert","year":"2010","journal-title":"DE Patent App DE200"},{"journal-title":"The Design of Rijndael","year":"2002","author":"daemen","key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2009.4784734"},{"key":"ref8","first-page":"2","article-title":"Computersystem und Verfahren zur Ausgabe von verschlusselten Daten","author":"hogl","year":"1998","journal-title":"DE Patent App DE 1"},{"journal-title":"Center for Strategic and International Studies Tech Rep","article-title":"The economic impact of cy-bercrime and cyber espionage","year":"2013","key":"ref7"},{"journal-title":"Spionage sabotage und datendiebstahl wirtschaftss-chutz im digitalen zeitalter bitkom","first-page":"1","year":"2015","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1597817.1597847"},{"key":"ref9","first-page":"27","article-title":"FPGA-Based Real-Time Implementation of AES Algorithm for Video Encryption","author":"kotel","year":"2014","journal-title":"Recent Advances in Telecommunications Informatics and Educational Technologies"}],"event":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","start":{"date-parts":[[2016,2,29]]},"location":"Sendai, Japan","end":{"date-parts":[[2016,3,2]]}},"container-title":["2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7469604\/7477224\/07477242.pdf?arnumber=7477242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:08:40Z","timestamp":1498316920000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7477242\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isba.2016.7477242","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}