{"id":"https://openalex.org/W2902058095","doi":"https://doi.org/10.1109/icacci.2018.8554950","title":"A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection","display_name":"A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2902058095","doi":"https://doi.org/10.1109/icacci.2018.8554950","mag":"2902058095"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2018.8554950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107826045","display_name":"Mazhar Tayel","orcid":null},"institutions":[{"id":"https://openalex.org/I84524832","display_name":"Alexandria University","ror":"https://ror.org/00mzz1w90","country_code":"EG","type":"education","lineage":["https://openalex.org/I84524832"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Mazhar Tayel","raw_affiliation_strings":["Electrical Engineering Department, Alexandria University, Alexandria, Egypt"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Alexandria University, Alexandria, Egypt","institution_ids":["https://openalex.org/I84524832"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081832036","display_name":"George Dawood","orcid":null},"institutions":[{"id":"https://openalex.org/I84524832","display_name":"Alexandria University","ror":"https://ror.org/00mzz1w90","country_code":"EG","type":"education","lineage":["https://openalex.org/I84524832"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"George Dawood","raw_affiliation_strings":["Electrical Engineering Department, Alexandria University, Alexandria, Egypt"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Alexandria University, Alexandria, Egypt","institution_ids":["https://openalex.org/I84524832"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033709680","display_name":"Hamed Shawky","orcid":null},"institutions":[{"id":"https://openalex.org/I84524832","display_name":"Alexandria University","ror":"https://ror.org/00mzz1w90","country_code":"EG","type":"education","lineage":["https://openalex.org/I84524832"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hamed Shawky","raw_affiliation_strings":["Electrical Engineering Department, Alexandria University, Alexandria, Egypt"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Alexandria University, Alexandria, Egypt","institution_ids":["https://openalex.org/I84524832"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5107826045"],"corresponding_institution_ids":["https://openalex.org/I84524832"],"apc_list":null,"apc_paid":null,"fwci":0.5223,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.71766446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"387","last_page":"391"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.7341545224189758},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.7026767134666443},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6872584819793701},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6517519354820251},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5929700136184692},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5773424506187439},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5711166262626648},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.5477820634841919},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5416184067726135},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.4889591932296753},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4606073200702667},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4515121281147003},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4410489499568939},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.422129362821579},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.4127747118473053},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3787382245063782}],"concepts":[{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.7341545224189758},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.7026767134666443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6872584819793701},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6517519354820251},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5929700136184692},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5773424506187439},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5711166262626648},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.5477820634841919},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5416184067726135},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.4889591932296753},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4606073200702667},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4515121281147003},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4410489499568939},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.422129362821579},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.4127747118473053},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3787382245063782}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2018.8554950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2018.8554950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W971696970","https://openalex.org/W1491408478","https://openalex.org/W1518029257","https://openalex.org/W1587809429","https://openalex.org/W1787484557","https://openalex.org/W1982774018","https://openalex.org/W1994959121","https://openalex.org/W1997798061","https://openalex.org/W2093810930","https://openalex.org/W2153831373","https://openalex.org/W2159269332","https://openalex.org/W2195148471","https://openalex.org/W2323473128","https://openalex.org/W2547857037","https://openalex.org/W2977619292","https://openalex.org/W3106246246"],"related_works":["https://openalex.org/W2247198827","https://openalex.org/W2613850739","https://openalex.org/W2965971786","https://openalex.org/W2375119003","https://openalex.org/W1972417273","https://openalex.org/W2610867406","https://openalex.org/W2337888590","https://openalex.org/W39105712","https://openalex.org/W3094714434","https://openalex.org/W2241715175"],"abstract_inverted_index":{"Cryptography":[0,89],"is":[1,24,37,79,91,110],"a":[2,17,82,94],"widespread":[3],"technique":[4],"that":[5],"maintains":[6],"information":[7],"security":[8,48,68],"over":[9],"insecure":[10,106],"networks.":[11],"The":[12],"symmetric":[13,51,70],"encryption":[14,33],"scheme":[15,85,97],"provides":[16],"good":[18],"security,":[19],"but":[20,39],"the":[21,27,31,44,57,60,66,73,114],"key":[22,35,63,95,100,117],"exchange":[23],"difficult":[25],"on":[26],"other":[28],"hand,":[29],"in":[30,128],"asymmetric":[32,61],"scheme,":[34],"management":[36,118],"easier,":[38],"it":[40,123],"does":[41],"not":[42],"offer":[43],"same":[45],"degree":[46],"of":[47,59,69,116],"compared":[49],"to":[50,98,112],"scheme.":[52],"A":[53],"hybrid":[54,75],"cryptosystem":[55],"merges":[56],"easiness":[58],"schemes":[62],"distribution":[64,103],"and":[65,86,102],"high":[67],"schemes.":[71],"In":[72],"proposed":[74],"cryptosystem,":[76],"Serpent":[77,120],"algorithm":[78],"used":[80,92,127],"as":[81,93],"data":[83],"encapsulation":[84,96],"Elliptic":[87],"Curve":[88],"(ECC)":[90],"achieve":[99],"generation":[101],"within":[104],"an":[105],"channel.":[107],"This":[108],"modification":[109],"done":[111],"tackle":[113],"issue":[115],"for":[119],"algorithm,":[121],"so":[122],"can":[124],"be":[125],"securely":[126],"multimedia":[129],"protection.":[130]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
