{"id":"https://openalex.org/W2968554904","doi":"https://doi.org/10.1109/uemcon.2018.8796805","title":"Encryption and Decryption of Mobile Security Using AES and GOST Algorithms","display_name":"Encryption and Decryption of Mobile Security Using AES and GOST Algorithms","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2968554904","doi":"https://doi.org/10.1109/uemcon.2018.8796805","mag":"2968554904"},"language":"en","primary_location":{"id":"doi:10.1109/uemcon.2018.8796805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2018.8796805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ilyas Yaqoob","orcid":null},"institutions":[{"id":"https://openalex.org/I3132053282","display_name":"City University of Science and Information Technology","ror":"https://ror.org/02jsdya97","country_code":"PK","type":"education","lineage":["https://openalex.org/I3132053282"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Ilyas Yaqoob","raw_affiliation_strings":["Department of Computer Science, City University of Science and Technology, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Science and Technology, Pakistan","institution_ids":["https://openalex.org/I3132053282"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069127487","display_name":"Talha Naqash","orcid":"https://orcid.org/0000-0002-9614-3780"},"institutions":[{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Talha Naqash","raw_affiliation_strings":["Department of Computer Science, Bahria University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bahria University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I59225215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102090270","display_name":"Sajjad Hussain Shah","orcid":null},"institutions":[{"id":"https://openalex.org/I59225215","display_name":"Bahria University","ror":"https://ror.org/02v8d7770","country_code":"PK","type":"education","lineage":["https://openalex.org/I59225215"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sajjad Hussain Shah","raw_affiliation_strings":["Department of Computer Science, Bahria University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Bahria University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I59225215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I3132053282"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.24117507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"8","issue":null,"first_page":"769","last_page":"772"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7763600945472717},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6989703178405762},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6533947587013245},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.578575611114502},{"id":"https://openalex.org/keywords/gost","display_name":"GOST (hash function)","score":0.5676548480987549},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5494800806045532},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5156568288803101},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5086041688919067},{"id":"https://openalex.org/keywords/encryption-software","display_name":"Encryption software","score":0.455244243144989},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4122801125049591},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.40248429775238037},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.379028856754303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29763418436050415},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.2601950168609619}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7763600945472717},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6989703178405762},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6533947587013245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.578575611114502},{"id":"https://openalex.org/C2780233296","wikidata":"https://www.wikidata.org/wiki/Q3756229","display_name":"GOST (hash function)","level":2,"score":0.5676548480987549},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5494800806045532},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5156568288803101},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5086041688919067},{"id":"https://openalex.org/C158104961","wikidata":"https://www.wikidata.org/wiki/Q5375622","display_name":"Encryption software","level":5,"score":0.455244243144989},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4122801125049591},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.40248429775238037},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.379028856754303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29763418436050415},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.2601950168609619}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/uemcon.2018.8796805","is_oa":false,"landing_page_url":"https://doi.org/10.1109/uemcon.2018.8796805","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.9100000262260437,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1599281790","https://openalex.org/W2169078624","https://openalex.org/W2962759994","https://openalex.org/W4213364676","https://openalex.org/W6635550122","https://openalex.org/W6658485302","https://openalex.org/W6684805129"],"related_works":["https://openalex.org/W2125214861","https://openalex.org/W2059218952","https://openalex.org/W3000297105","https://openalex.org/W2522069694","https://openalex.org/W2889511553","https://openalex.org/W1798672631","https://openalex.org/W2698153239","https://openalex.org/W4280572121","https://openalex.org/W1991257029","https://openalex.org/W612677566"],"abstract_inverted_index":{"Different":[0],"methodologies":[1,68],"had":[2],"been":[3],"used":[4,105,121],"in":[5,98],"recent":[6],"years":[7],"to":[8,51,173],"get":[9],"out":[10],"of":[11,31,49,192],"these":[12],"security":[13],"issues":[14],"using":[15,88,184],"distributed":[16,19],"database":[17],"and":[18,22,61,71,190],"architecture.":[20],"Encryption":[21],"decryption":[23,67],"are":[24,196],"the":[25,58],"main":[26],"techniques":[27],"while":[28],"there":[29],"way":[30,48],"implementation":[32,50],"is":[33,38,141,161,170],"different.":[34],"But":[35],"one":[36,47],"thing":[37],"being":[39],"ignored":[40],"that":[41,103],"battery":[42,180],"powered":[43],"consumption":[44,181],"vary":[45],"from":[46],"other.":[52],"In":[53],"this":[54,185],"work,":[55],"we":[56,77,94],"calculate":[57],"energy":[59],"Consumption":[60],"other":[62],"differences":[63],"between":[64],"different":[65,135],"encryption":[66,168],"like":[69],"DES":[70,104],"AES.":[72],"AES-256":[73,99,186],"becomes":[74,188],"implementable":[75,189],"when":[76,87,93],"use":[78,95,148],"block":[79],"cipher":[80],"properly.":[81],"Block":[82],"Cipher":[83],"shows":[84,102],"no":[85],"issue":[86],"AES-128":[89],"but":[90,166],"it":[91,96,140],"do":[92],"improperly":[97],".The":[100],"result":[101],"56":[106],"bit":[107,123,150],"key":[108,124],"size":[109,125],"which":[110,126,138,151,160,176,195],"can":[111,127,146,152],"give":[112,128],"7.2":[113],"x":[114,130,154],"10":[115,131,155],"<sup":[116,132,156],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[117,133,157],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">16</sup>":[118],"whereas":[119],"AES":[120,145],"128":[122],"3.4":[129],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">39</sup>":[134],"possible":[136],"combination":[137,159],"show":[139],"more":[142,164],"secure":[143,165],".":[144],"also":[147,167],"256":[149],"1.1":[153],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">77</sup>":[158],"not":[162],"only":[163],"time":[169],"dramatically":[171],"decrease":[172],"30-40":[174],"percent":[175],"will":[177,187],"directly":[178],"increase":[179],"time.":[182],"After":[183],"all":[191],"its":[193],"advantages":[194],"mentioned":[197],"above":[198],"could":[199],"be":[200],"fully":[201],"useable.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
