{"id":"https://openalex.org/W3211879086","doi":"https://doi.org/10.1109/icccnt51525.2021.9579574","title":"Efficient Way of Result Publication System by Using Cryptography","display_name":"Efficient Way of Result Publication System by Using Cryptography","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3211879086","doi":"https://doi.org/10.1109/icccnt51525.2021.9579574","mag":"3211879086"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073992837","display_name":"Masab Hasnain","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Masab Hasnain","raw_affiliation_strings":["Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032586131","display_name":"Tanzuma Afroz","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Tanzuma Afroz","raw_affiliation_strings":["Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047211601","display_name":"Saifa Sabrina Mim","orcid":null},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Saifa Sabrina Mim","raw_affiliation_strings":["Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068374271","display_name":"Abdus Sattar","orcid":"https://orcid.org/0000-0003-3863-3113"},"institutions":[{"id":"https://openalex.org/I200606013","display_name":"Daffodil International University","ror":"https://ror.org/052t4a858","country_code":"BD","type":"education","lineage":["https://openalex.org/I200606013"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Abdus Sattar","raw_affiliation_strings":["Daffodil International University, Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Daffodil International University, Dhaka, Bangladesh","institution_ids":["https://openalex.org/I200606013"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073992837"],"corresponding_institution_ids":["https://openalex.org/I200606013"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16454523,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7676451206207275},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7080345749855042},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6412681341171265},{"id":"https://openalex.org/keywords/publication","display_name":"Publication","score":0.6129361391067505},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5788506865501404},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5540291666984558},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5312720537185669},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.515026330947876},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.48150214552879333},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.45633620023727417},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4259803891181946},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.40154868364334106},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3439040184020996},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1215294897556305}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7676451206207275},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7080345749855042},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6412681341171265},{"id":"https://openalex.org/C41458344","wikidata":"https://www.wikidata.org/wiki/Q732577","display_name":"Publication","level":2,"score":0.6129361391067505},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5788506865501404},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5540291666984558},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5312720537185669},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.515026330947876},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.48150214552879333},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.45633620023727417},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4259803891181946},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.40154868364334106},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3439040184020996},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1215294897556305},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W111584737","https://openalex.org/W1532725354","https://openalex.org/W1556212265","https://openalex.org/W1575679653","https://openalex.org/W2184119796","https://openalex.org/W2549825570","https://openalex.org/W2603381048","https://openalex.org/W4285719527","https://openalex.org/W6631858713","https://openalex.org/W6634540144"],"related_works":["https://openalex.org/W2796427561","https://openalex.org/W3009555975","https://openalex.org/W2741205042","https://openalex.org/W3094394851","https://openalex.org/W2229809156","https://openalex.org/W1966025096","https://openalex.org/W1989266974","https://openalex.org/W2898548365","https://openalex.org/W2117667232","https://openalex.org/W3115310671"],"abstract_inverted_index":{"Nowadays":[0],"almost":[1],"all":[2],"exam":[3],"results":[4,29],"are":[5],"published":[6],"online":[7],"in":[8,16,46,109],"Bangladesh.":[9],"Online":[10],"publication":[11,75,112],"systems":[12],"work":[13],"very":[14,37],"well":[15],"most":[17],"cases.":[18],"But":[19],"when":[20],"there":[21],"is":[22,103],"a":[23,47],"large":[24],"number":[25],"of":[26,54],"candidates":[27],"whose":[28],"need":[30],"to":[31,67,80,105],"be":[32],"published,":[33],"result":[34,59,99,111],"servers":[35],"become":[36],"slow":[38],"and":[39,64],"unusable.":[40],"We":[41,85],"have":[42,86],"solved":[43],"this":[44,107],"problem":[45],"cost-effective":[48],"way.":[49],"After":[50],"the":[51,58,68,74,82,98],"final":[52],"preparation":[53],"results,":[55],"we":[56],"encrypt":[57],"using":[60],"symmetric":[61],"key":[62],"cryptography":[63],"send":[65],"it":[66],"individual":[69],"students":[70,94],"email":[71],"addresses.":[72],"On":[73],"date":[76],"authority":[77],"only":[78],"needs":[79],"publish":[81],"decryption":[83],"password.":[84],"also":[87],"developed":[88],"an":[89],"android":[90],"application":[91],"by":[92],"which":[93],"can":[95],"easily":[96],"view":[97],"after":[100],"decryption.":[101],"It":[102],"possible":[104],"implement":[106],"project":[108],"existing":[110],"systems.":[113]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
