{"id":"https://openalex.org/W4256310366","doi":"https://doi.org/10.1109/icitst.2013.6750222","title":"BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security","display_name":"BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W4256310366","doi":"https://doi.org/10.1109/icitst.2013.6750222"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111323469","display_name":"Aditya Yulianto","orcid":null},"institutions":[{"id":"https://openalex.org/I3133096382","display_name":"Multimedia Nusantara University","ror":"https://ror.org/00sefv038","country_code":"ID","type":"education","lineage":["https://openalex.org/I3133096382"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Aditya Yulianto","raw_affiliation_strings":["Computer Science Faculty, Universitas Multimedia Nusantara, Tangerang, Indonesia"],"affiliations":[{"raw_affiliation_string":"Computer Science Faculty, Universitas Multimedia Nusantara, Tangerang, Indonesia","institution_ids":["https://openalex.org/I3133096382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044813945","display_name":"S. Kom","orcid":null},"institutions":[{"id":"https://openalex.org/I3133096382","display_name":"Multimedia Nusantara University","ror":"https://ror.org/00sefv038","country_code":"ID","type":"education","lineage":["https://openalex.org/I3133096382"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"S. Kom","raw_affiliation_strings":["Universitas Multimedia Nusantara, Jakarta, ID"],"affiliations":[{"raw_affiliation_string":"Universitas Multimedia Nusantara, Jakarta, ID","institution_ids":["https://openalex.org/I3133096382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063221364","display_name":"Maria Irmina Prasetiyowati","orcid":"https://orcid.org/0000-0003-1815-7068"},"institutions":[{"id":"https://openalex.org/I3133096382","display_name":"Multimedia Nusantara University","ror":"https://ror.org/00sefv038","country_code":"ID","type":"education","lineage":["https://openalex.org/I3133096382"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Maria Irmina Prasetiyowati","raw_affiliation_strings":["Universitas Multimedia Nusantara, Jakarta, ID"],"affiliations":[{"raw_affiliation_string":"Universitas Multimedia Nusantara, Jakarta, ID","institution_ids":["https://openalex.org/I3133096382"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111323469"],"corresponding_institution_ids":["https://openalex.org/I3133096382"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.3829671,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"357","last_page":"362"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7308475971221924},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6842899322509766},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6051163077354431},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5742429494857788},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5596181750297546},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5554608702659607},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5022740364074707},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49817538261413574},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4435615837574005}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7308475971221924},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6842899322509766},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6051163077354431},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5742429494857788},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5596181750297546},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5554608702659607},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5022740364074707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49817538261413574},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4435615837574005}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750222","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750222","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W89245623","https://openalex.org/W142045744","https://openalex.org/W1660562555","https://openalex.org/W1766693108","https://openalex.org/W1879031822","https://openalex.org/W2102237354","https://openalex.org/W2102550826","https://openalex.org/W2105101922","https://openalex.org/W2183208781","https://openalex.org/W4212851301","https://openalex.org/W6603593642","https://openalex.org/W6639312340","https://openalex.org/W6675651505","https://openalex.org/W6677767409"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W2944823289","https://openalex.org/W1004582678","https://openalex.org/W2946255556","https://openalex.org/W1996899447","https://openalex.org/W4387195303","https://openalex.org/W3202072339","https://openalex.org/W2621974100","https://openalex.org/W2400329213","https://openalex.org/W2883256554"],"abstract_inverted_index":{"Dropbox,":[0],"a":[1,21,40,46,124],"popular":[2],"cloud":[3],"storage":[4],"provider,":[5],"pose":[6],"several":[7],"threats":[8],"especially":[9],"in":[10,134],"terms":[11],"of":[12,61,93],"file":[13,130],"security":[14],"and":[15,20,29,39,55,73,97,115,128],"unauthorized":[16,83],"access.":[17],"An":[18],"Android":[19],"web":[22,41],"application":[23,42,68],"which":[24],"implemented":[25,91],"Serpent":[26,88],"cryptographic":[27],"algorithm":[28,89],"One-Time":[30],"Password":[31],"(OTP)":[32],"mechanism":[33],"to":[34,65,75],"secure":[35],"files":[36,72,78],"on":[37],"Dropbox":[38,50,71],"was":[43,90,103,131],"built":[44],"as":[45,105],"solution":[47],"by":[48,82],"utilizing":[49],"Application":[51],"Programming":[52],"Interface":[53],"(API)":[54],"Bouncy":[56],"Castle":[57],"library.":[58],"The":[59,110],"aim":[60],"this":[62,86],"research":[63,111],"is":[64],"make":[66],"an":[67,98],"for":[69,122],"encrypting":[70],"therefore,":[74],"ensure":[76],"uploaded":[77],"from":[79],"being":[80],"accessed":[81],"parties.":[84],"In":[85],"research,":[87],"because":[92],"its":[94],"hardware":[95],"efficiency":[96],"additional":[99,106],"feature,":[100],"OTP":[101],"mechanism,":[102],"used":[104],"user":[107],"authentication":[108],"process.":[109],"shown":[112],"that":[113],"encryption":[114],"decryption":[116],"processes":[117],"each":[118],"took":[119],"three":[120],"seconds":[121],"processing":[123],"two":[125],"megabytes":[126],"file,":[127],"the":[129],"not":[132],"accessible":[133],"encrypted":[135],"form.":[136]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
