{"id":"https://openalex.org/W2093666096","doi":"https://doi.org/10.1109/wocn.2012.6335543","title":"An improved cryptographic algorithm using UNICODE and universal colors","display_name":"An improved cryptographic algorithm using UNICODE and universal colors","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2093666096","doi":"https://doi.org/10.1109/wocn.2012.6335543","mag":"2093666096"},"language":"en","primary_location":{"id":"doi:10.1109/wocn.2012.6335543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wocn.2012.6335543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045257218","display_name":"Hemant Suryavanshi","orcid":null},"institutions":[{"id":"https://openalex.org/I138272832","display_name":"Devi Ahilya Vishwavidyalaya","ror":"https://ror.org/05c2p1f98","country_code":"IN","type":"education","lineage":["https://openalex.org/I138272832"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Hemant Suryavanshi","raw_affiliation_strings":["Department of Information Technology, IET-DAVV, Indore, Madhya Pradesh, India","Department of Information Technology, IET, DAVV, Indore, MP, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, IET-DAVV, Indore, Madhya Pradesh, India","institution_ids":["https://openalex.org/I138272832"]},{"raw_affiliation_string":"Department of Information Technology, IET, DAVV, Indore, MP, India","institution_ids":["https://openalex.org/I138272832"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034310422","display_name":"Pratosh Bansal","orcid":"https://orcid.org/0000-0003-1696-3736"},"institutions":[{"id":"https://openalex.org/I138272832","display_name":"Devi Ahilya Vishwavidyalaya","ror":"https://ror.org/05c2p1f98","country_code":"IN","type":"education","lineage":["https://openalex.org/I138272832"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pratosh Bansal","raw_affiliation_strings":["Department of Information Technology, IET-DAVV, Indore, Madhya Pradesh, India","Department of Information Technology, IET, DAVV, Indore, MP, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, IET-DAVV, Indore, Madhya Pradesh, India","institution_ids":["https://openalex.org/I138272832"]},{"raw_affiliation_string":"Department of Information Technology, IET, DAVV, Indore, MP, India","institution_ids":["https://openalex.org/I138272832"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045257218"],"corresponding_institution_ids":["https://openalex.org/I138272832"],"apc_list":null,"apc_paid":null,"fwci":0.8563,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79587117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.6977999806404114,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.6977999806404114,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12541","display_name":"Graph Labeling and Dimension Problems","score":0.6873999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8307482600212097},{"id":"https://openalex.org/keywords/unicode","display_name":"Unicode","score":0.7558772563934326},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7005947828292847},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5809862017631531},{"id":"https://openalex.org/keywords/plain-text","display_name":"Plain text","score":0.49283528327941895},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.45723140239715576},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.4401167333126068},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4123397171497345},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38062137365341187},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3487664461135864},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12934821844100952},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.1186627745628357}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8307482600212097},{"id":"https://openalex.org/C500551929","wikidata":"https://www.wikidata.org/wiki/Q8819","display_name":"Unicode","level":2,"score":0.7558772563934326},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7005947828292847},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5809862017631531},{"id":"https://openalex.org/C46503548","wikidata":"https://www.wikidata.org/wiki/Q1145976","display_name":"Plain text","level":3,"score":0.49283528327941895},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.45723140239715576},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.4401167333126068},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4123397171497345},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38062137365341187},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3487664461135864},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12934821844100952},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.1186627745628357}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wocn.2012.6335543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wocn.2012.6335543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1505014760","https://openalex.org/W2130907815","https://openalex.org/W2313020143","https://openalex.org/W4285719527","https://openalex.org/W6698764685"],"related_works":["https://openalex.org/W1953677193","https://openalex.org/W3113362864","https://openalex.org/W2404000518","https://openalex.org/W589182691","https://openalex.org/W1993328117","https://openalex.org/W2358376734","https://openalex.org/W3197228483","https://openalex.org/W4245161533","https://openalex.org/W2408307142","https://openalex.org/W2234673521"],"abstract_inverted_index":{"With":[0],"the":[1,84,88,100,107],"growth":[2],"of":[3,57,83,103],"communication/transaction":[4],"over":[5,106],"internet":[6],"and":[7,34,37,65,91],"continuous":[8,15],"efforts":[9],"by":[10,77],"cryptanalysts":[11],"there":[12],"is":[13,28,54,75,82],"a":[14],"need":[16],"for":[17,24,96],"strong":[18],"cryptographic":[19],"algorithms.":[20],"The":[21,71],"primary":[22],"goal,":[23],"designing":[25],"such":[26],"algorithms,":[27],"to":[29],"provide":[30],"security.":[31],"However,":[32],"performance":[33],"implementation":[35],"ease":[36],"execution":[38],"time":[39],"are":[40],"other":[41],"factors":[42],"that":[43,74],"make":[44],"an":[45,55,58],"algorithm":[46,61],"more":[47],"usable.":[48],"An":[49],"improved":[50,79],"encryption":[51,60,80],"model,":[52],"which":[53],"extension":[56],"existing":[59],"based":[62],"on":[63],"UNICODE":[64],"Colors":[66],"map":[67],"can":[68],"be":[69,94],"used.":[70],"cipher":[72],"text":[73,90],"generated":[76],"using":[78],"model":[81],"same":[85],"size":[86],"as":[87],"plain":[89],"it":[92],"will":[93],"suitable":[95],"practical":[97],"use":[98],"in":[99],"secure":[101],"transmission":[102],"confidential":[104],"information":[105],"Internet.":[108]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
