Asynchronous Updating Boolean Network Encryption Algorithm
An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity process from a system perspective to reveal the disease mechanism and treat the disease. Therefore, to ensure the safe transmission of the a...
Uložené v:
| Vydané v: | IEEE transactions on circuits and systems for video technology Ročník 33; číslo 8; s. 4388 - 4400 |
|---|---|
| Hlavní autori: | , , , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
New York
IEEE
01.08.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Predmet: | |
| ISSN: | 1051-8215, 1558-2205 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity process from a system perspective to reveal the disease mechanism and treat the disease. Therefore, to ensure the safe transmission of the asynchronous updating Boolean network in the network, we designed an asynchronous updating Boolean network encryption algorithm based on chaos (ABNEA). First, a novel 2D chaotic system (2D-FPSM) is designed. This system has better performance than the classical 2D chaotic system. It is very suitable for cryptographic systems to generate key streams. Second, an encoding rule is designed to convert the asynchronous updating Boolean network to a Boolean matrix and propagate it on the network as an image. The receiver and sender jointly save the encoding rule. Last, to protect the safe propagation of the Boolean network matrix on the network, the method of synchronous scrambling-diffusion is adapted to encrypt the Boolean network matrix based on the 2D-FPSM. Simulation experiments and security analysis show that the average correlation of adjacent pixels of ciphertext are 0.0010, -0.0010, -0.0020, and the average information entropy is 7.9984. The ABNEA can complete the encryption tasks of asynchronously updating Boolean networks and exhibits good security characteristics. |
|---|---|
| AbstractList | An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity process from a system perspective to reveal the disease mechanism and treat the disease. Therefore, to ensure the safe transmission of the asynchronous updating Boolean network in the network, we designed an asynchronous updating Boolean network encryption algorithm based on chaos (ABNEA). First, a novel 2D chaotic system (2D-FPSM) is designed. This system has better performance than the classical 2D chaotic system. It is very suitable for cryptographic systems to generate key streams. Second, an encoding rule is designed to convert the asynchronous updating Boolean network to a Boolean matrix and propagate it on the network as an image. The receiver and sender jointly save the encoding rule. Last, to protect the safe propagation of the Boolean network matrix on the network, the method of synchronous scrambling-diffusion is adapted to encrypt the Boolean network matrix based on the 2D-FPSM. Simulation experiments and security analysis show that the average correlation of adjacent pixels of ciphertext are 0.0010, -0.0010, -0.0020, and the average information entropy is 7.9984. The ABNEA can complete the encryption tasks of asynchronously updating Boolean networks and exhibits good security characteristics. |
| Author | Wang, Xingyuan Gao, Suo Wu, Rui Li, Qi Tang, Xianglong Wang, Chunpeng Liu, Jiafeng |
| Author_xml | – sequence: 1 givenname: Suo orcidid: 0000-0002-0020-6469 surname: Gao fullname: Gao, Suo email: gaosuo@stu.hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China – sequence: 2 givenname: Rui surname: Wu fullname: Wu, Rui email: simple@hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China – sequence: 3 givenname: Xingyuan orcidid: 0000-0002-3844-3195 surname: Wang fullname: Wang, Xingyuan email: xywang@dlmu.edu.cn organization: School of Information Science and Technology, Dalian Maritime University, Dalian, China – sequence: 4 givenname: Jiafeng surname: Liu fullname: Liu, Jiafeng email: jefferyliu@hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China – sequence: 5 givenname: Qi orcidid: 0000-0001-7729-1422 surname: Li fullname: Li, Qi email: qluliqi@163.com organization: School of Information Science and Technology, Dalian Maritime University, Dalian, China – sequence: 6 givenname: Chunpeng orcidid: 0000-0002-3742-5614 surname: Wang fullname: Wang, Chunpeng email: mpeng1122@163.com organization: School of Cyber Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China – sequence: 7 givenname: Xianglong surname: Tang fullname: Tang, Xianglong email: tangxl@hit.edu.cn organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China |
| BookMark | eNp9kE1PwzAMhiM0JLbBH0AcKnHuiJ2kTbmNaXxICA5sXKu0TbeOLhlJJrR_T8d2QBw42bLex7aeAekZazQhl0BHADS7mU3e3mcjpMhGDFkKLDkhfRBCxohU9LqeCoglgjgjA-9XlAKXPO2T27HfmXLprLFbH803lQqNWUR31rZamehFhy_rPqKpKd1uExpronG7sK4Jy_U5Oa1V6_XFsQ7J_H46mzzGz68PT5Pxc1xiloRYASsQIRO8ZrSbZAqAiYpDkWmoBErMoEhRF4rXCpkStaorTtOESS3KrGZDcn3Yu3H2c6t9yFd260x3MkfJRZpQliRdSh5SpbPeO13nZRPU_uPgVNPmQPO9qfzHVL43lR9NdSj-QTeuWSu3-x-6OkCN1voXQEFiytk3PCt2KA |
| CODEN | ITCTEM |
| CitedBy_id | crossref_primary_10_1109_TCSVT_2024_3394951 crossref_primary_10_3390_electronics13061140 crossref_primary_10_1007_s11071_025_11001_w crossref_primary_10_1109_ACCESS_2024_3351693 crossref_primary_10_3390_e26090760 crossref_primary_10_1016_j_matcom_2025_04_005 crossref_primary_10_1109_ACCESS_2023_3319335 crossref_primary_10_3390_app13148385 crossref_primary_10_1088_1402_4896_acc5b6 crossref_primary_10_1109_ACCESS_2024_3415083 crossref_primary_10_1142_S179396232550028X crossref_primary_10_1007_s10489_024_05613_9 crossref_primary_10_1007_s11071_023_08859_z crossref_primary_10_1016_j_nahs_2024_101528 crossref_primary_10_1016_j_jisa_2024_103791 crossref_primary_10_1016_j_apm_2024_06_016 crossref_primary_10_1016_j_optlaseng_2025_109084 crossref_primary_10_1007_s11760_023_02925_0 crossref_primary_10_1109_JIOT_2023_3325223 crossref_primary_10_1109_TCSVT_2025_3543824 crossref_primary_10_1007_s11042_023_16469_5 crossref_primary_10_1016_j_chaos_2024_115581 crossref_primary_10_1016_j_eswa_2025_129040 crossref_primary_10_1109_TCSVT_2024_3466961 crossref_primary_10_1016_j_talanta_2024_127078 crossref_primary_10_1007_s10489_023_04996_5 crossref_primary_10_1016_j_neunet_2024_106904 crossref_primary_10_1088_1402_4896_aceb9b crossref_primary_10_1016_j_jisa_2025_104153 crossref_primary_10_1016_j_jksuci_2023_101595 crossref_primary_10_1007_s11071_024_10191_z crossref_primary_10_1109_JIOT_2024_3411623 crossref_primary_10_1016_j_eswa_2024_124891 crossref_primary_10_1088_1402_4896_ad24a6 crossref_primary_10_1016_j_eswa_2024_125851 crossref_primary_10_1088_1402_4896_ad418d crossref_primary_10_1109_TCSVT_2024_3429641 crossref_primary_10_1109_TCSVT_2024_3483569 crossref_primary_10_3390_e27080790 crossref_primary_10_15446_ing_investig_106069 crossref_primary_10_1016_j_cnsns_2023_107653 crossref_primary_10_1109_ACCESS_2024_3354701 crossref_primary_10_1016_j_cosrev_2025_100816 crossref_primary_10_1016_j_compeleceng_2024_110011 crossref_primary_10_1109_TCSVT_2024_3384297 crossref_primary_10_1007_s00521_023_08434_y crossref_primary_10_1109_TSMC_2024_3401412 crossref_primary_10_1088_1402_4896_add5a4 crossref_primary_10_1109_ACCESS_2024_3459925 crossref_primary_10_2298_TSCI2406205B crossref_primary_10_1016_j_eswa_2025_127475 crossref_primary_10_1007_s10489_024_05929_6 crossref_primary_10_1016_j_jisa_2025_104004 crossref_primary_10_1109_TII_2024_3395631 crossref_primary_10_1007_s10489_024_05447_5 crossref_primary_10_1007_s13389_023_00343_z crossref_primary_10_3390_sym17081255 crossref_primary_10_1109_TCSVT_2025_3545788 crossref_primary_10_1145_3695463 crossref_primary_10_3390_math11102322 crossref_primary_10_1140_epjs_s11734_025_01611_1 crossref_primary_10_1109_JIOT_2025_3569457 crossref_primary_10_1016_j_chaos_2024_114958 crossref_primary_10_1109_JIOT_2024_3376572 |
| Cites_doi | 10.1109/ACCESS.2019.2906292 10.1109/TII.2018.2791944 10.1007/s11042-022-12220-8 10.1109/TIFS.2016.2566261 10.1016/j.ins.2021.10.050 10.1016/j.sigpro.2021.108041 10.1007/s00521-018-3913-3 10.1016/j.ins.2020.09.055 10.1109/TNNLS.2022.3146570 10.1109/TII.2020.3014158 10.1109/TCSVT.2021.3138795 10.1142/S0218127419500949 10.1016/j.ins.2021.12.126 10.1016/j.ins.2019.10.070 10.1109/TCSI.2021.3121555 10.1080/0161-118991863745 10.1109/TCSVT.2020.3021908 10.1016/0022-5193(69)90015-0 10.1109/TCSVT.2022.3140974 10.1109/TCBB.2014.2338313 10.1016/j.matcom.2022.02.029 10.1109/TCSVT.2021.3062947 10.1109/TNNLS.2015.2512849 10.1109/TITS.2021.3129598 10.1016/j.chaos.2021.111318 10.1016/j.ins.2010.11.009 10.1016/j.ins.2019.08.041 10.1016/j.adhoc.2019.101989 10.1007/s11432-019-2813-7 10.1016/j.ins.2014.11.018 10.1016/j.ins.2021.07.096 10.1016/j.sigpro.2022.108527 10.1016/j.optlaseng.2019.04.011 10.1109/TCBB.2019.2914051 10.1109/TII.2020.2992438 10.1016/j.optlastec.2019.105777 10.1016/j.chaos.2022.112770 10.1109/TCSI.2021.3133318 10.1007/s11071-021-06308-3 10.1007/s11071-021-06663-1 10.1016/j.ins.2020.06.030 10.1117/1.JEI.21.1.013014 10.1007/s11042-020-08850-5 10.1007/s11071-018-4391-y 10.1016/j.optlastec.2021.107316 10.1109/TCSVT.2021.3094882 10.1007/s11071-019-05378-8 10.1109/TCSVT.2020.3039112 10.1016/j.jfranklin.2019.10.006 10.1007/s11071-016-2857-3 10.1142/S0218127418501444 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TCSVT.2023.3237136 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2205 |
| EndPage | 4400 |
| ExternalDocumentID | 10_1109_TCSVT_2023_3237136 10018274 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund grantid: MMJJ20170203 – fundername: Key Research and Development Projects of Liaoning Province grantid: 2019020105-JH2/103 funderid: 10.13039/501100019033 – fundername: National Natural Science Foundation of China grantid: 61672124; 61672190 funderid: 10.13039/501100001809 |
| GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS RXW TAE TN5 VH1 AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c296t-a13b221954f302969a1135d41b9e1d528291b72eba4fa23a5fafd407638e5c9f3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 76 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001045167400065&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1051-8215 |
| IngestDate | Mon Jun 30 05:51:24 EDT 2025 Sat Nov 29 01:44:21 EST 2025 Tue Nov 18 22:16:48 EST 2025 Wed Aug 27 02:55:14 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c296t-a13b221954f302969a1135d41b9e1d528291b72eba4fa23a5fafd407638e5c9f3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7729-1422 0000-0002-3844-3195 0000-0002-3742-5614 0000-0002-0020-6469 |
| PQID | 2845760366 |
| PQPubID | 85433 |
| PageCount | 13 |
| ParticipantIDs | crossref_citationtrail_10_1109_TCSVT_2023_3237136 crossref_primary_10_1109_TCSVT_2023_3237136 ieee_primary_10018274 proquest_journals_2845760366 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-08-01 |
| PublicationDateYYYYMMDD | 2023-08-01 |
| PublicationDate_xml | – month: 08 year: 2023 text: 2023-08-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on circuits and systems for video technology |
| PublicationTitleAbbrev | TCSVT |
| PublicationYear | 2023 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 ref53 ref52 ref55 ref10 ref54 ref17 s k u (ref28) 2020; 90 ref16 ref19 ref18 ref51 ref50 ref46 ref45 ref48 ref47 ref42 ref41 ref43 ref49 ref8 ref7 wu (ref44) 2011; 1 ref9 ref4 ref3 ref6 ref5 ref40 ref35 ref34 ref37 ref36 ref31 ref33 ref32 ref2 shahna (ref30) 2021; 99 ref1 ref39 ref38 gao (ref11) 2022; 202 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref27 ref29 |
| References_xml | – ident: ref32 doi: 10.1109/ACCESS.2019.2906292 – volume: 99 year: 2021 ident: ref30 article-title: Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion publication-title: Signal Process Image Commun – ident: ref52 doi: 10.1109/TII.2018.2791944 – ident: ref37 doi: 10.1007/s11042-022-12220-8 – ident: ref9 doi: 10.1109/TIFS.2016.2566261 – ident: ref3 doi: 10.1016/j.ins.2021.10.050 – ident: ref35 doi: 10.1016/j.sigpro.2021.108041 – ident: ref7 doi: 10.1007/s00521-018-3913-3 – ident: ref55 doi: 10.1016/j.ins.2020.09.055 – ident: ref45 doi: 10.1109/TNNLS.2022.3146570 – volume: 202 year: 2022 ident: ref11 article-title: A 3D model encryption scheme based on a cascaded chaotic system publication-title: Signal Process – ident: ref2 doi: 10.1109/TII.2020.3014158 – ident: ref14 doi: 10.1109/TCSVT.2021.3138795 – ident: ref21 doi: 10.1142/S0218127419500949 – volume: 90 year: 2020 ident: ref28 article-title: A novel image encryption scheme using both pixel level and bit level permutation with chaotic map publication-title: Appl Soft Comput – ident: ref54 doi: 10.1016/j.ins.2021.12.126 – ident: ref4 doi: 10.1016/j.ins.2019.10.070 – ident: ref46 doi: 10.1109/TCSI.2021.3121555 – ident: ref18 doi: 10.1080/0161-118991863745 – ident: ref16 doi: 10.1109/TCSVT.2020.3021908 – ident: ref38 doi: 10.1016/0022-5193(69)90015-0 – ident: ref6 doi: 10.1109/TCSVT.2022.3140974 – ident: ref42 doi: 10.1109/TCBB.2014.2338313 – ident: ref43 doi: 10.1016/j.matcom.2022.02.029 – ident: ref12 doi: 10.1109/TCSVT.2021.3062947 – ident: ref48 doi: 10.1109/TNNLS.2015.2512849 – ident: ref47 doi: 10.1109/TITS.2021.3129598 – ident: ref51 doi: 10.1016/j.chaos.2021.111318 – ident: ref29 doi: 10.1016/j.ins.2010.11.009 – ident: ref41 doi: 10.1016/j.ins.2019.08.041 – ident: ref1 doi: 10.1016/j.adhoc.2019.101989 – ident: ref39 doi: 10.1007/s11432-019-2813-7 – ident: ref25 doi: 10.1016/j.ins.2014.11.018 – ident: ref53 doi: 10.1016/j.ins.2021.07.096 – ident: ref5 doi: 10.1016/j.sigpro.2022.108527 – ident: ref24 doi: 10.1016/j.optlaseng.2019.04.011 – ident: ref40 doi: 10.1109/TCBB.2019.2914051 – ident: ref19 doi: 10.1109/TII.2020.2992438 – ident: ref8 doi: 10.1016/j.optlastec.2019.105777 – ident: ref17 doi: 10.1016/j.chaos.2022.112770 – ident: ref15 doi: 10.1109/TCSI.2021.3133318 – volume: 1 start-page: 31 year: 2011 ident: ref44 article-title: NPCR and UACI randomness tests for image encryption. Cyber journals: Multidisciplinary journals in science and technology publication-title: J Sel Areas Telecommun – ident: ref36 doi: 10.1007/s11071-021-06308-3 – ident: ref26 doi: 10.1007/s11071-021-06663-1 – ident: ref34 doi: 10.1016/j.ins.2020.06.030 – ident: ref23 doi: 10.1117/1.JEI.21.1.013014 – ident: ref50 doi: 10.1007/s11042-020-08850-5 – ident: ref27 doi: 10.1007/s11071-018-4391-y – ident: ref49 doi: 10.1016/j.optlastec.2021.107316 – ident: ref13 doi: 10.1109/TCSVT.2021.3094882 – ident: ref31 doi: 10.1007/s11071-019-05378-8 – ident: ref10 doi: 10.1109/TCSVT.2020.3039112 – ident: ref33 doi: 10.1016/j.jfranklin.2019.10.006 – ident: ref22 doi: 10.1007/s11071-016-2857-3 – ident: ref20 doi: 10.1142/S0218127418501444 |
| SSID | ssj0014847 |
| Score | 2.6299531 |
| Snippet | An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 4388 |
| SubjectTerms | Algorithms Bifurcation Boolean Boolean functions Boolean network Chaos Chaos theory Cryptography Encoding Encryption Entropy (Information theory) Gene expression image encryption image processing NIST Scrambling (communication) Security Tensors Trajectory Two dimensional analysis |
| Title | Asynchronous Updating Boolean Network Encryption Algorithm |
| URI | https://ieeexplore.ieee.org/document/10018274 https://www.proquest.com/docview/2845760366 |
| Volume | 33 |
| WOSCitedRecordID | wos001045167400065&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library customDbUrl: eissn: 1558-2205 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014847 issn: 1051-8215 databaseCode: RIE dateStart: 19910101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED7c8EEf_DlxOqUPvkm3pm3axLc5NnwagpvsraRpOgezHd0m7L_3knZDEQXfSpqUcpfk7svlvgO4k4blyxcIUwXTYUZqC5wodiIUeruUav4RU2wiHA7ZZMKfq2R1kwujlDKXz1RbP5pYfpLLtT4q62i-IIYwqga1MAzKZK1dyMBnppoY-gvEZmjIthkyDu-Mei-vo7YuFN72XA9hWfDNCpmyKj_2YmNgBsf__LUTOKo8Satbqv4U9lR2Bodf-AXP4aG73GRS098ivrfGC53KkE2txzyfK5FZw_IKuNXPZLExW4fVnU_zYrZ6e2_AeNAf9Z7sqliCLV0erGxBvNh1NX9b6jnYwgUhHk18EnNFEqoDpiQOXRULPxWuJ2gq0gTRHK4_RSVPvQuoZ3mmLsFyGZPatXLxnS_DIHZinlBs5KhxlqZNIFvhRbJiEtcFLeaRQRQOj4zAIy3wqBJ4E-53YxYlj8afvRtaxF96ltJtQmurpKhaa8sIDSyCJrTEwdUvw67hQH-9vLfXgvqqWKsb2Jcfq9myuDXT6BODjsJu |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED50CuqDPydOp_bBN-lcf6RrfJtjY-Isgp3sraRpOgezHd0m7L_3knZjIgq-lTSh5ZL07uvlvg_ghiuWL5shTGWuTDMSneFC0SMmMNolRPKPKLGJhue5gwF9KYrVVS2MEEIdPhM1ealy-VHK5_JX2Z3kC3IRRm3ClpTOInm51ippYLtKTwwjBkN30ZUta2Tq9M5vvb75NSkVXrNMC4GZ880PKWGVH19j5WI6B_98uUPYL2JJrZlP_hFsiOQY9tYYBk_gvjldJFwS4CLC1_oTWcyQDLWHNB0Llmhefghcayc8W6iPh9YcD9NsNHv_KEO_0_ZbXb2QS9C5SZ2ZzgwrNE3J4BZbdWyhzDAsEtlGSIUREZkyNcKGKUJmx8y0GIlZHCGewx0oCKexdQqlJE3EGWim63IZXJl4z-YNJ6yHNCLYSHHO3TiugLE0XsALLnEpaTEOFKao00AZPJAGDwqDV-B2NWaSM2n82bssTbzWM7duBarLSQqK3TYN0MUibEJf7Jz_Muwadrr-cy_oPXpPF7Arn5Sf4qtCaZbNxSVs88_ZaJpdqSX1BdcIxbk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Asynchronous+Updating+Boolean+Network+Encryption+Algorithm&rft.jtitle=IEEE+transactions+on+circuits+and+systems+for+video+technology&rft.au=Gao%2C+Suo&rft.au=Wu%2C+Rui&rft.au=Wang%2C+Xingyuan&rft.au=Liu%2C+Jiafeng&rft.date=2023-08-01&rft.issn=1051-8215&rft.eissn=1558-2205&rft.volume=33&rft.issue=8&rft.spage=4388&rft.epage=4400&rft_id=info:doi/10.1109%2FTCSVT.2023.3237136&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCSVT_2023_3237136 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1051-8215&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1051-8215&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1051-8215&client=summon |