{"id":"https://openalex.org/W4379932958","doi":"https://doi.org/10.1145/3590837.3590953","title":"Absolute Data Security Scheme: An Advanced Approach towards Data Security","display_name":"Absolute Data Security Scheme: An Advanced Approach towards Data Security","publication_year":2022,"publication_date":"2022-12-23","ids":{"openalex":"https://openalex.org/W4379932958","doi":"https://doi.org/10.1145/3590837.3590953"},"language":"en","primary_location":{"id":"doi:10.1145/3590837.3590953","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590953","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101627011","display_name":"Ritu Shukla","orcid":"https://orcid.org/0009-0002-3115-1277"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ritu Shukla","raw_affiliation_strings":["Computer Engineering, RTU, India and Computer Engineering, RTU, Rajasthan"],"raw_orcid":"https://orcid.org/0009-0002-3115-1277","affiliations":[{"raw_affiliation_string":"Computer Engineering, RTU, India and Computer Engineering, RTU, Rajasthan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101818798","display_name":"Dinesh Goyal","orcid":"https://orcid.org/0000-0001-5442-5870"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dinesh Goyal","raw_affiliation_strings":["Computer Engineering, RTU, India"],"raw_orcid":"https://orcid.org/0000-0001-5442-5870","affiliations":[{"raw_affiliation_string":"Computer Engineering, RTU, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028894776","display_name":"Shruti Thapar","orcid":"https://orcid.org/0000-0001-5579-7633"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shruti Thapar","raw_affiliation_strings":["COMPUTER SCIENCE, PIET, India"],"raw_orcid":"https://orcid.org/0000-0001-5579-7633","affiliations":[{"raw_affiliation_string":"COMPUTER SCIENCE, PIET, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092120544","display_name":"Rohit Chhabra","orcid":"https://orcid.org/0009-0007-4593-7285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rohit Chhabra","raw_affiliation_strings":["Artificial intelligence and Data Science, Jaipur Engineering College and Research Centre, India"],"raw_orcid":"https://orcid.org/0009-0007-4593-7285","affiliations":[{"raw_affiliation_string":"Artificial intelligence and Data Science, Jaipur Engineering College and Research Centre, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101627011"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17417516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8061501383781433},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6952790021896362},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6575087904930115},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6191341876983643},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.5039317011833191},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4277879297733307},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42104610800743103},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41971439123153687},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.41678160429000854}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8061501383781433},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6952790021896362},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6575087904930115},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6191341876983643},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.5039317011833191},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4277879297733307},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42104610800743103},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41971439123153687},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.41678160429000854},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3590837.3590953","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590953","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","display_name":"Good health and well-being","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W99899120","https://openalex.org/W2076368268","https://openalex.org/W2341551514","https://openalex.org/W4210333876","https://openalex.org/W4232836212","https://openalex.org/W4377043424","https://openalex.org/W6611465443","https://openalex.org/W6636123720"],"related_works":["https://openalex.org/W2359085393","https://openalex.org/W2021087413","https://openalex.org/W2377774403","https://openalex.org/W2237863779","https://openalex.org/W2156083280","https://openalex.org/W2387329106","https://openalex.org/W2969720675","https://openalex.org/W1844709308","https://openalex.org/W1990594668","https://openalex.org/W4388720174"],"abstract_inverted_index":{"With":[0],"the":[1,5,9,24,41,60,70,82,88,96,102,107,111,170,177,194,198],"exponential":[2],"increase":[3,22],"in":[4,23,87,139,154,193],"applications":[6,136],"of":[7,11,26,72,75,98,145,176,184,197],"digitalization,":[8],"risk":[10],"data":[12,108],"breach":[13],"and":[14,32,48,187],"theft":[15],"is":[16,86,101,152,165,181],"also":[17],"rising":[18],"tremendously.":[19],"The":[20],"abrupt":[21],"use":[25],"digital":[27,46],"money,":[28],"especially":[29],"after":[30],"demonetization":[31],"then":[33],"during":[34],"Corona":[35],"pandemic,":[36],"has":[37,55],"developed":[38],"dependencies":[39],"on":[40],"online":[42],"transactions":[43],"via":[44],"different":[45],"payments":[47],"financial":[49],"service":[50],"providers.":[51],"In":[52,69,115],"this":[53,116],"it":[54,85],"become":[56],"challenging":[57],"to":[58,160],"keep":[59,106],"information":[61,83],"including":[62],"credentials,":[63],"One":[64],"Time":[65],"Password":[66],"etc.":[67],"secure.":[68],"course":[71],"time,":[73],"number":[74],"blooming":[76],"techniques":[77,100,190],"are":[78,119],"introduced":[79],"which":[80,130,168,191],"secure":[81,195],"whether":[84],"network":[89],"or":[90],"stored":[91],"at":[92],"secured":[93],"architecture.":[94],"But":[95],"soul":[97],"these":[99],"complex":[103],"algorithms":[104],"that":[105],"confidential":[109],"from":[110],"attackers/":[112],"unintended":[113],"users.":[114],"paper":[117],"we":[118],"proposing":[120],"a":[121,166,182],"robust":[122],"scheme":[123,180],"named":[124],"as":[125,172,174],"Absolute":[126],"Data":[127,147],"Security":[128],"Scheme":[129],"can":[131],"be":[132],"useful":[133],"for":[134],"securing":[135],"commonly":[137],"used":[138,153],"modern":[140],"environment.":[141],"A":[142],"customized":[143],"version":[144],"International":[146],"Encryption":[148],"Algorithm":[149],"(IDEA)":[150],"algorithm":[151,159],"combination":[155,167,183],"with":[156],"message":[157,188],"digest":[158,189],"provide":[161],"better":[162],"security.":[163],"It":[164],"preserves":[169],"confidentiality":[171],"well":[173],"integrity":[175],"data.":[178,199],"This":[179],"encryption;":[185],"decryption":[186],"contribute":[192],"transmission":[196]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
