{"id":"https://openalex.org/W4404030105","doi":"https://doi.org/10.1109/icccnt61001.2024.10724844","title":"A Critical Analysis of Key Management Techniques in Applied Cryptography","display_name":"A Critical Analysis of Key Management Techniques in Applied Cryptography","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404030105","doi":"https://doi.org/10.1109/icccnt61001.2024.10724844"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724844","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114068984","display_name":"K Balaji","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"K Balaji","raw_affiliation_strings":["Amrita Vishwa Vidya Peetham,Department Commerce and Management,Mysuru campus"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidya Peetham,Department Commerce and Management,Mysuru campus","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094136824","display_name":"Aruna Sri Rongali","orcid":null},"institutions":[{"id":"https://openalex.org/I276309446","display_name":"University of the Cumberlands","ror":"https://ror.org/05jz3sn81","country_code":"US","type":"education","lineage":["https://openalex.org/I276309446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aruna Sri Rongali","raw_affiliation_strings":["University of The Cumberlands,Information Technology Emphasis/Information Technology, Ph.D,US"],"affiliations":[{"raw_affiliation_string":"University of The Cumberlands,Information Technology Emphasis/Information Technology, Ph.D,US","institution_ids":["https://openalex.org/I276309446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019438241","display_name":"N. Archana","orcid":"https://orcid.org/0000-0002-2976-3672"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ns Archana","raw_affiliation_strings":["Amrita Vishwa Vidhyapeetham,Department of Commerce and Management,Mysuru campus,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidhyapeetham,Department of Commerce and Management,Mysuru campus,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114515611","display_name":"G. Sethuraman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Sethuraman","raw_affiliation_strings":["kpr college of arts science and research,department of commerce (information technology),coimbatore,641407"],"affiliations":[{"raw_affiliation_string":"kpr college of arts science and research,department of commerce (information technology),coimbatore,641407","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114515612","display_name":"Jithesh Mon Mullool","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jithesh Mon Mullool","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Department of Commerce and Management,Mysuru Campus,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Department of Commerce and Management,Mysuru Campus,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060831129","display_name":"R. Karthi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130415","display_name":"Open International University for Alternative Medicines","ror":"https://ror.org/03t25y916","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130415"]},{"id":"https://openalex.org/I4387153026","display_name":"E.G.S. Pillay Engineering College","ror":"https://ror.org/03s9gtm48","country_code":null,"type":"education","lineage":["https://openalex.org/I4387153026"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. Karthi","raw_affiliation_strings":["E.G.S. Pillay Engineering College,Department of Management Studies,Nagapattinam,Tamilnadu,India"],"affiliations":[{"raw_affiliation_string":"E.G.S. Pillay Engineering College,Department of Management Studies,Nagapattinam,Tamilnadu,India","institution_ids":["https://openalex.org/I4210130415","https://openalex.org/I4387153026"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5114068984"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19887397,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.36250001192092896,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.36250001192092896,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6713407039642334},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6135961413383484},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6129838824272156},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5478978157043457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4611054062843323}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6713407039642334},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6135961413383484},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6129838824272156},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5478978157043457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4611054062843323}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724844","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724844","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W3215994486","https://openalex.org/W4293094989","https://openalex.org/W4312238145","https://openalex.org/W4312734072","https://openalex.org/W4312816296","https://openalex.org/W4312835327","https://openalex.org/W4322742403","https://openalex.org/W4379164190","https://openalex.org/W4380201108","https://openalex.org/W4383224298","https://openalex.org/W4385670544","https://openalex.org/W4385712343","https://openalex.org/W4389445919","https://openalex.org/W6963393055"],"related_works":["https://openalex.org/W2957415295","https://openalex.org/W2152563268","https://openalex.org/W2025411550","https://openalex.org/W2134686030","https://openalex.org/W4240532262","https://openalex.org/W2392390330","https://openalex.org/W2952702399","https://openalex.org/W3093625357","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"This":[0],"paper":[1,69],"critically":[2],"analyzes":[3],"essential":[4],"management":[5,36],"techniques":[6],"in":[7,18],"carried":[8],"out":[9],"cryptography.":[10],"It":[11,32,91],"critiques":[12],"diverse":[13],"answers":[14],"and":[15,27,41,45,51,66,86,95],"challenges":[16],"confronted":[17],"coping":[19],"with":[20],"virtual":[21],"keys":[22],"related":[23],"to":[24,79,85],"cryptographic":[25],"programs":[26],"the":[28,59,72,101],"opportunities":[29],"for":[30],"development.":[31],"examines":[33],"numerous":[34],"key":[35,49,52],"strategies":[37],"consisting":[38],"of":[39,74,88,103],"symmetric":[40],"uneven":[42],"algorithms,":[43],"hierarchical":[44],"non-hierarchical":[46],"control":[47,98],"protocols,":[48],"escrow,":[50],"revocation":[53],"technology.":[54],"The":[55,68],"dialogue":[56],"also":[57],"covers":[58],"critical":[60,97],"era,":[61],"distribution,":[62],"authentication,":[63],"garage,":[64],"audit,":[65],"destruction.":[67],"additionally":[70],"highlights":[71],"advantages":[73],"enforcing":[75],"comprehensive":[76],"protection":[77],"protocols":[78],"defend":[80],"against":[81],"unauthorized":[82],"get":[83],"entry":[84],"manipulation":[87],"mystery":[89],"keys.":[90],"concludes":[92],"that":[93],"comfortable":[94],"reliable":[96],"systems":[99],"form":[100],"cornerstone":[102],"practical":[104],"implemented":[105],"cryptography\u2026":[106]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
