{"id":"https://openalex.org/W4313116645","doi":"https://doi.org/10.1145/3549206.3549207","title":"Web Application Based Text Encryption","display_name":"Web Application Based Text Encryption","publication_year":2022,"publication_date":"2022-08-04","ids":{"openalex":"https://openalex.org/W4313116645","doi":"https://doi.org/10.1145/3549206.3549207"},"language":"en","primary_location":{"id":"doi:10.1145/3549206.3549207","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3549206.3549207","pdf_url":null,"source":{"id":"https://openalex.org/S4363609025","display_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002329507","display_name":"Rashmi Kushwah","orcid":"https://orcid.org/0000-0003-1232-0426"},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rashmi Kushwah","raw_affiliation_strings":["Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India","institution_ids":["https://openalex.org/I154970844"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042775288","display_name":"Rishabh Rajpurohit","orcid":null},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rishabh Rajpurohit","raw_affiliation_strings":["Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India","institution_ids":["https://openalex.org/I154970844"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110953361","display_name":"Paul Jonathan","orcid":null},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Paul Jonathan","raw_affiliation_strings":["Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India","institution_ids":["https://openalex.org/I154970844"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103719172","display_name":"Gaurav Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I154970844","display_name":"Jaypee Institute of Information Technology","ror":"https://ror.org/05sttyy11","country_code":"IN","type":"education","lineage":["https://openalex.org/I154970844"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gaurav Kumar","raw_affiliation_strings":["Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering &amp; Information Technology, Jaypee Institute of Information Technology, India","institution_ids":["https://openalex.org/I154970844"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002329507"],"corresponding_institution_ids":["https://openalex.org/I154970844"],"apc_list":null,"apc_paid":null,"fwci":0.06,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.33124198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8094706535339355},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6299382448196411},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5568020343780518},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.42696523666381836},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.30687808990478516},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.23360171914100647},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22910287976264954}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8094706535339355},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6299382448196411},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5568020343780518},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.42696523666381836},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.30687808990478516},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.23360171914100647},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22910287976264954}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3549206.3549207","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3549206.3549207","pdf_url":null,"source":{"id":"https://openalex.org/S4363609025","display_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1990337861","https://openalex.org/W2032946605","https://openalex.org/W2040229318","https://openalex.org/W2156455865","https://openalex.org/W2748251709","https://openalex.org/W2790404258","https://openalex.org/W2795092948","https://openalex.org/W3028022196"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2139596909","https://openalex.org/W2081337217","https://openalex.org/W2263165406","https://openalex.org/W2146354553","https://openalex.org/W2509141950","https://openalex.org/W1809074097","https://openalex.org/W1585782846","https://openalex.org/W178471791","https://openalex.org/W1967286098"],"abstract_inverted_index":{"In":[0,112],"today\u2019s":[1],"world":[2],"we":[3,45,159,212,221],"are":[4],"using":[5],"cryptography":[6],"everywhere.":[7],"Cryptography":[8],"ensures":[9],"that":[10],"the":[11,21,24,27,51,64,95,115,139,156,163,180,187,210],"information":[12],"is":[13,57,92,107,117,130,146],"secured":[14],"and":[15,23,60,66,121,169,218],"can":[16],"only":[17],"be":[18,82],"accessed":[19],"by":[20,141],"sender":[22],"receiver":[25],"of":[26,53,89,97,125,151,182],"message.":[28],"We":[29,99,184],"use":[30,170,216],"it":[31,76,80],"to":[32,81,93,119,165,175,190,204,215],"securely":[33],"send":[34],"passwords":[35,193],"over":[36],"vast":[37],"networks":[38],"for":[39,79,148],"online":[40],"purchases.":[41],"During":[42],"recent":[43],"time,":[44],"have":[46,100,160,185,214,222],"seen":[47],"a":[48,102,142,149],"rise":[49],"in":[50,84,179,194],"number":[52,150],"cyberattacks.":[54],"Our":[55],"data":[56,178],"becoming":[58],"less":[59,61],"secure.":[62],"Also,":[63],"encryption":[65],"decryption":[67],"process":[68],"has":[69,74,201],"become":[70],"really":[71,77],"cumbersome":[72],"which":[73,106],"made":[75],"difficult":[78],"used":[83,131,186,203],"daily":[85],"life.":[86],"The":[87,197],"aim":[88],"our":[90,171,195],"paper":[91],"protect":[94],"privacy":[96],"users.":[98],"proposed":[101,157,172,198,224],"novel":[103],"RKJ":[104,199],"algorithm":[105,114,189,200],"based":[108],"on":[109,227],"keyless":[110],"encryption.":[111],"this":[113],"message":[116],"converted":[118],"binary":[120],"divided":[122],"into":[123],"groups":[124],"32":[126],"bits.":[127],"Every":[128],"group":[129],"as":[132],"its":[133],"own":[134],"key":[135],"after":[136],"round":[137],"shifting":[138],"bits":[140],"random":[143],"amount.":[144],"This":[145],"done":[147],"times":[152],"(rounds).":[153],"Apart":[154],"from":[155],"algorithms,":[158],"also":[161],"provided":[162],"users":[164],"create":[166],"an":[167],"id":[168],"web":[173,225],"application":[174,226],"store":[176,191],"important":[177],"form":[181],"notes.":[183,207],"blowfish":[188],"these":[192,206],"database.":[196],"been":[202],"encrypt":[205],"To":[208],"read":[209],"notes":[211],"would":[213],"login":[217],"password.":[219],"Finally,":[220],"hosted":[223],"Heroku.":[228]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
