{"id":"https://openalex.org/W1935270046","doi":"https://doi.org/10.1109/roedunet.2015.7311980","title":"Testing the performance of the improved Rubik's cube encryption algorithm on virtual systems","display_name":"Testing the performance of the improved Rubik's cube encryption algorithm on virtual systems","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W1935270046","doi":"https://doi.org/10.1109/roedunet.2015.7311980","mag":"1935270046"},"language":"en","primary_location":{"id":"doi:10.1109/roedunet.2015.7311980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/roedunet.2015.7311980","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032196187","display_name":"Valeriu Manuel Ionescu","orcid":"https://orcid.org/0000-0003-2641-1599"},"institutions":[{"id":"https://openalex.org/I185286233","display_name":"University of Pitesti","ror":"https://ror.org/058b16x44","country_code":"RO","type":"education","lineage":["https://openalex.org/I185286233"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Valeriu Manuel Ionescu","raw_affiliation_strings":["Faculty of Electronics, Communications and Computer Science, University of Pitesti, Romania"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronics, Communications and Computer Science, University of Pitesti, Romania","institution_ids":["https://openalex.org/I185286233"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085250922","display_name":"Adrian-Viorel Diaconu","orcid":"https://orcid.org/0000-0002-8051-7506"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adrian-Viorel Diaconu","raw_affiliation_strings":["IT&C Department, Lumina - The University of South - East Europe, Bucharest 021187, Romania"],"affiliations":[{"raw_affiliation_string":"IT&C Department, Lumina - The University of South - East Europe, Bucharest 021187, Romania","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032196187"],"corresponding_institution_ids":["https://openalex.org/I185286233"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.05515728,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"121","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.810335636138916},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8033641576766968},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5864284634590149},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.5445681810379028},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5414966940879822},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5383632183074951},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5186744928359985},{"id":"https://openalex.org/keywords/cube","display_name":"Cube (algebra)","score":0.507419764995575},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.45123347640037537},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36238837242126465},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2612094283103943},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.15836912393569946},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0787607729434967}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.810335636138916},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8033641576766968},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5864284634590149},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.5445681810379028},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5414966940879822},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5383632183074951},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5186744928359985},{"id":"https://openalex.org/C53051483","wikidata":"https://www.wikidata.org/wiki/Q861555","display_name":"Cube (algebra)","level":2,"score":0.507419764995575},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45123347640037537},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36238837242126465},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2612094283103943},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.15836912393569946},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0787607729434967},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/roedunet.2015.7311980","is_oa":false,"landing_page_url":"https://doi.org/10.1109/roedunet.2015.7311980","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2022123767","https://openalex.org/W2090964036"],"related_works":["https://openalex.org/W1190020395","https://openalex.org/W4385414763","https://openalex.org/W4240313302","https://openalex.org/W3022099831","https://openalex.org/W4315815885","https://openalex.org/W2188413349","https://openalex.org/W2915067502","https://openalex.org/W2079094492","https://openalex.org/W1484220609","https://openalex.org/W2054187149"],"abstract_inverted_index":{"Securing":[0],"image":[1],"content":[2],"through":[3,65],"encryption":[4,17,97,133],"is":[5,8,11,19,122],"sometimes":[6],"necessary":[7],"sensitive":[9],"data":[10],"monitored.":[12],"The":[13,48,69,80,117],"improved":[14,94],"Rubik's":[15,95,131],"cube":[16,96,132],"algorithm":[18,49,98],"a":[20,44,66],"simple":[21,27],"yet":[22],"powerful":[23],"solution":[24],"that":[25,41],"uses":[26],"functions":[28],"(such":[29],"as":[30],"shuffling,":[31],"XOR":[32],"operations":[33],"with":[34,125],"rows":[35],"and":[36,38,58,101,114],"columns":[37],"matrix":[39,46],"transposition)":[40],"operate":[42],"on":[43,51,105],"pixel":[45],"array.":[47],"runs":[50],"both":[52],"the":[53,56,59,62,83,93,120,126,129],"client":[54],"(performing":[55,61],"encryption)":[57],"server":[60],"decryption)":[63],"communicating":[64],"computer":[67],"network.":[68],"clients":[70],"are":[71],"various":[72],"systems":[73],"ranging":[74],"from":[75],"mobile":[76],"to":[77],"desktop":[78],"systems.":[79],"servers":[81,106],"where":[82],"tests":[84,102],"were":[85,87],"made":[86],"virtualized":[88],"machines.":[89],"This":[90],"paper":[91],"implements":[92],"in":[99],"Java":[100],"its":[103],"performance":[104,118],"running":[107],"two":[108],"bare":[109],"metal":[110],"hypervisors:":[111],"VMware":[112],"ESXi":[113],"Microsoft":[115],"Hyper-V.":[116],"of":[119,128],"implementation":[121,127],"also":[123],"compared":[124],"original":[130],"algorithm.":[134]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
