{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:41:52Z","timestamp":1730328112520,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3652481","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T17:48:36Z","timestamp":1715622516000},"page":"1-7","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Key Management Strategies for Applied Cryptography Protocols"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6779-6467","authenticated-orcid":false,"given":"Jaganathan","family":"Logeshwaran","sequence":"first","affiliation":[{"name":"Sri Eshwar College of Engineering, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8258-055X","authenticated-orcid":false,"given":"Manoj Kumar","family":"Mahto","sequence":"additional","affiliation":[{"name":"Vignan Institute of Technology and Science, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4008-3309","authenticated-orcid":false,"given":"G L","family":"Saini","sequence":"additional","affiliation":[{"name":"School of Computing and Intelligent Systems, Manipal University Jaipur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3414-5086","authenticated-orcid":false,"given":"Deepak","family":"Panwar","sequence":"additional","affiliation":[{"name":"Manipal University Jaipur, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3239043"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.37385\/jaets.v4i2.1947"},{"key":"e_1_3_2_1_3_1","first-page":"2208","volume-title":"2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1","author":"Anitha C.","year":"2023","unstructured":"Anitha, C., Priscila, S. S., Mahaveerakannan, R., & Balakrishnan, B. (2023, March). An Efficient Secure Routing and Hierarchical Approach to Elliptic Curve Cryptography Combined with Distributed Group Key Management. In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 2208-2212). IEEE."},{"key":"e_1_3_2_1_4_1","volume-title":"Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things, 100913","author":"Edris E. K. K.","year":"2023","unstructured":"Edris, E. K. K., Aiash, M., Khoshkholghi, M. A., Naha, R., Chowdhury, A., & Loo, J. (2023). Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things, 100913."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-9919-1.ch004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Maakar Sunil Kr Manju Khurana Chinmay Chakraborty Deepak Sinwar and Durgesh Srivastava. \"Performance evaluation of AODV and DSR routing protocols for flying ad hoc network using highway mobility model.\" Journal of Circuits Systems and Computers 31 no. 01 (2022): 2250008.","DOI":"10.1142\/S0218126622500086"},{"key":"e_1_3_2_1_7_1","volume-title":"AIP Publishing","author":"Sheenam","year":"2022","unstructured":"Sheenam, and Durgesh Srivastava. \"Dwindling of interference by adopting MRMC technique in WMN.\" In AIP Conference Proceedings, vol. 2576, no. 1. AIP Publishing, 2022."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/infrastructures8020022"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3172374"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEARS53579.2022.9751932"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Cross layered cryptography based secure routing for IoT-enabled smart healthcare system","author":"Kore A.","year":"2022","unstructured":"Kore, A., & Patil, S. (2022). Cross layered cryptography based secure routing for IoT-enabled smart healthcare system. Wireless Networks, 1-15.","journal-title":"Wireless Networks"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym15010152"},{"key":"e_1_3_2_1_13_1","first-page":"161","article-title":"CEA: Certification based encryption algorithm for enhanced data protection in social networks","volume":"1","author":"Ramkumar M.","year":"2022","unstructured":"Ramkumar, M., Logeshwaran, J., & Husna, T. (2022). CEA: Certification based encryption algorithm for enhanced data protection in social networks. Fundamentals of Applied Mathematics and Soft Computing, 1, 161-170.","journal-title":"Fundamentals of Applied Mathematics and Soft Computing"},{"key":"e_1_3_2_1_14_1","volume-title":"Jour of Adv Research in Dynamical & Control Systems, Vol.- 11, 02-Special Issue","author":"Durgesh","year":"2019","unstructured":"Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, \u201cPerformance Evaluation of Entropy Based Graph Network Intrusion Detection System (E-Ids)\u201d, in Jour of Adv Research in Dynamical & Control Systems, Vol.- 11, 02-Special Issue, 2019"},{"key":"e_1_3_2_1_15_1","volume-title":"International Journal of Emerging Technology and Advanced Engineering","volume":"8","author":"Durgesh Dr.","year":"2018","unstructured":"Durgesh Srivastava, Nachiket Sainis and Dr. Rajeshwar Singh, \u201cClassification of various Dataset for Intrusion Detection System\u201d, in International Journal of Emerging Technology and Advanced Engineering, Volume 8, Issue 1, January 2018."},{"key":"e_1_3_2_1_16_1","unstructured":"Durgesh Srivastava Rajeshwar Singh Vikram Singh \u201cAn Intelligent Gray Wolf Optimizer: A Nature Inspired Technique in Intrusion Detection System (IDS)\u201d in Journal of Advancements in Robotics. 2019; 6(1): 18\u201324p"},{"key":"e_1_3_2_1_17_1","volume-title":"International Journal Of Computer Sciences And Engineering 7(5):757-764","author":"Durgesh","year":"2019","unstructured":"Durgesh Srivastava, Rajeshwar Singh and Vikram Singh, \u201cAnalysis of different Hybrid methods for Intrusion Detection System,\u201d International Journal Of Computer Sciences And Engineering 7(5):757-764, May 2019"},{"key":"e_1_3_2_1_18_1","volume-title":"Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes. Computer Systems Science & Engineering, 45(1)","author":"Sankar S. M.","year":"2023","unstructured":"Sankar, S. M., Revathi, S. T., & Thiagarajan, R. (2023). Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes. Computer Systems Science & Engineering, 45(1)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym15020438"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219265921410310"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management & Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3652481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T22:52:50Z","timestamp":1721170370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3652481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":20,"alternative-id":["10.1145\/3647444.3652481","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3652481","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}