Asynchronous Updating Boolean Network Encryption Algorithm

An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity process from a system perspective to reveal the disease mechanism and treat the disease. Therefore, to ensure the safe transmission of the a...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on circuits and systems for video technology Ročník 33; číslo 8; s. 4388 - 4400
Hlavní autori: Gao, Suo, Wu, Rui, Wang, Xingyuan, Liu, Jiafeng, Li, Qi, Wang, Chunpeng, Tang, Xianglong
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York IEEE 01.08.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:1051-8215, 1558-2205
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity process from a system perspective to reveal the disease mechanism and treat the disease. Therefore, to ensure the safe transmission of the asynchronous updating Boolean network in the network, we designed an asynchronous updating Boolean network encryption algorithm based on chaos (ABNEA). First, a novel 2D chaotic system (2D-FPSM) is designed. This system has better performance than the classical 2D chaotic system. It is very suitable for cryptographic systems to generate key streams. Second, an encoding rule is designed to convert the asynchronous updating Boolean network to a Boolean matrix and propagate it on the network as an image. The receiver and sender jointly save the encoding rule. Last, to protect the safe propagation of the Boolean network matrix on the network, the method of synchronous scrambling-diffusion is adapted to encrypt the Boolean network matrix based on the 2D-FPSM. Simulation experiments and security analysis show that the average correlation of adjacent pixels of ciphertext are 0.0010, -0.0010, -0.0020, and the average information entropy is 7.9984. The ABNEA can complete the encryption tasks of asynchronously updating Boolean networks and exhibits good security characteristics.
AbstractList An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity process from a system perspective to reveal the disease mechanism and treat the disease. Therefore, to ensure the safe transmission of the asynchronous updating Boolean network in the network, we designed an asynchronous updating Boolean network encryption algorithm based on chaos (ABNEA). First, a novel 2D chaotic system (2D-FPSM) is designed. This system has better performance than the classical 2D chaotic system. It is very suitable for cryptographic systems to generate key streams. Second, an encoding rule is designed to convert the asynchronous updating Boolean network to a Boolean matrix and propagate it on the network as an image. The receiver and sender jointly save the encoding rule. Last, to protect the safe propagation of the Boolean network matrix on the network, the method of synchronous scrambling-diffusion is adapted to encrypt the Boolean network matrix based on the 2D-FPSM. Simulation experiments and security analysis show that the average correlation of adjacent pixels of ciphertext are 0.0010, -0.0010, -0.0020, and the average information entropy is 7.9984. The ABNEA can complete the encryption tasks of asynchronously updating Boolean networks and exhibits good security characteristics.
Author Wang, Xingyuan
Gao, Suo
Wu, Rui
Li, Qi
Tang, Xianglong
Wang, Chunpeng
Liu, Jiafeng
Author_xml – sequence: 1
  givenname: Suo
  orcidid: 0000-0002-0020-6469
  surname: Gao
  fullname: Gao, Suo
  email: gaosuo@stu.hit.edu.cn
  organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
– sequence: 2
  givenname: Rui
  surname: Wu
  fullname: Wu, Rui
  email: simple@hit.edu.cn
  organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
– sequence: 3
  givenname: Xingyuan
  orcidid: 0000-0002-3844-3195
  surname: Wang
  fullname: Wang, Xingyuan
  email: xywang@dlmu.edu.cn
  organization: School of Information Science and Technology, Dalian Maritime University, Dalian, China
– sequence: 4
  givenname: Jiafeng
  surname: Liu
  fullname: Liu, Jiafeng
  email: jefferyliu@hit.edu.cn
  organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
– sequence: 5
  givenname: Qi
  orcidid: 0000-0001-7729-1422
  surname: Li
  fullname: Li, Qi
  email: qluliqi@163.com
  organization: School of Information Science and Technology, Dalian Maritime University, Dalian, China
– sequence: 6
  givenname: Chunpeng
  orcidid: 0000-0002-3742-5614
  surname: Wang
  fullname: Wang, Chunpeng
  email: mpeng1122@163.com
  organization: School of Cyber Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China
– sequence: 7
  givenname: Xianglong
  surname: Tang
  fullname: Tang, Xianglong
  email: tangxl@hit.edu.cn
  organization: School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China
BookMark eNp9kE1PwzAMhiM0JLbBH0AcKnHuiJ2kTbmNaXxICA5sXKu0TbeOLhlJJrR_T8d2QBw42bLex7aeAekZazQhl0BHADS7mU3e3mcjpMhGDFkKLDkhfRBCxohU9LqeCoglgjgjA-9XlAKXPO2T27HfmXLprLFbH803lQqNWUR31rZamehFhy_rPqKpKd1uExpronG7sK4Jy_U5Oa1V6_XFsQ7J_H46mzzGz68PT5Pxc1xiloRYASsQIRO8ZrSbZAqAiYpDkWmoBErMoEhRF4rXCpkStaorTtOESS3KrGZDcn3Yu3H2c6t9yFd260x3MkfJRZpQliRdSh5SpbPeO13nZRPU_uPgVNPmQPO9qfzHVL43lR9NdSj-QTeuWSu3-x-6OkCN1voXQEFiytk3PCt2KA
CODEN ITCTEM
CitedBy_id crossref_primary_10_1109_TCSVT_2024_3394951
crossref_primary_10_3390_electronics13061140
crossref_primary_10_1007_s11071_025_11001_w
crossref_primary_10_1109_ACCESS_2024_3351693
crossref_primary_10_3390_e26090760
crossref_primary_10_1016_j_matcom_2025_04_005
crossref_primary_10_1109_ACCESS_2023_3319335
crossref_primary_10_3390_app13148385
crossref_primary_10_1088_1402_4896_acc5b6
crossref_primary_10_1109_ACCESS_2024_3415083
crossref_primary_10_1142_S179396232550028X
crossref_primary_10_1007_s10489_024_05613_9
crossref_primary_10_1007_s11071_023_08859_z
crossref_primary_10_1016_j_nahs_2024_101528
crossref_primary_10_1016_j_jisa_2024_103791
crossref_primary_10_1016_j_apm_2024_06_016
crossref_primary_10_1016_j_optlaseng_2025_109084
crossref_primary_10_1007_s11760_023_02925_0
crossref_primary_10_1109_JIOT_2023_3325223
crossref_primary_10_1109_TCSVT_2025_3543824
crossref_primary_10_1007_s11042_023_16469_5
crossref_primary_10_1016_j_chaos_2024_115581
crossref_primary_10_1016_j_eswa_2025_129040
crossref_primary_10_1109_TCSVT_2024_3466961
crossref_primary_10_1016_j_talanta_2024_127078
crossref_primary_10_1007_s10489_023_04996_5
crossref_primary_10_1016_j_neunet_2024_106904
crossref_primary_10_1088_1402_4896_aceb9b
crossref_primary_10_1016_j_jisa_2025_104153
crossref_primary_10_1016_j_jksuci_2023_101595
crossref_primary_10_1007_s11071_024_10191_z
crossref_primary_10_1109_JIOT_2024_3411623
crossref_primary_10_1016_j_eswa_2024_124891
crossref_primary_10_1088_1402_4896_ad24a6
crossref_primary_10_1016_j_eswa_2024_125851
crossref_primary_10_1088_1402_4896_ad418d
crossref_primary_10_1109_TCSVT_2024_3429641
crossref_primary_10_1109_TCSVT_2024_3483569
crossref_primary_10_3390_e27080790
crossref_primary_10_15446_ing_investig_106069
crossref_primary_10_1016_j_cnsns_2023_107653
crossref_primary_10_1109_ACCESS_2024_3354701
crossref_primary_10_1016_j_cosrev_2025_100816
crossref_primary_10_1016_j_compeleceng_2024_110011
crossref_primary_10_1109_TCSVT_2024_3384297
crossref_primary_10_1007_s00521_023_08434_y
crossref_primary_10_1109_TSMC_2024_3401412
crossref_primary_10_1088_1402_4896_add5a4
crossref_primary_10_1109_ACCESS_2024_3459925
crossref_primary_10_2298_TSCI2406205B
crossref_primary_10_1016_j_eswa_2025_127475
crossref_primary_10_1007_s10489_024_05929_6
crossref_primary_10_1016_j_jisa_2025_104004
crossref_primary_10_1109_TII_2024_3395631
crossref_primary_10_1007_s10489_024_05447_5
crossref_primary_10_1007_s13389_023_00343_z
crossref_primary_10_3390_sym17081255
crossref_primary_10_1109_TCSVT_2025_3545788
crossref_primary_10_1145_3695463
crossref_primary_10_3390_math11102322
crossref_primary_10_1140_epjs_s11734_025_01611_1
crossref_primary_10_1109_JIOT_2025_3569457
crossref_primary_10_1016_j_chaos_2024_114958
crossref_primary_10_1109_JIOT_2024_3376572
Cites_doi 10.1109/ACCESS.2019.2906292
10.1109/TII.2018.2791944
10.1007/s11042-022-12220-8
10.1109/TIFS.2016.2566261
10.1016/j.ins.2021.10.050
10.1016/j.sigpro.2021.108041
10.1007/s00521-018-3913-3
10.1016/j.ins.2020.09.055
10.1109/TNNLS.2022.3146570
10.1109/TII.2020.3014158
10.1109/TCSVT.2021.3138795
10.1142/S0218127419500949
10.1016/j.ins.2021.12.126
10.1016/j.ins.2019.10.070
10.1109/TCSI.2021.3121555
10.1080/0161-118991863745
10.1109/TCSVT.2020.3021908
10.1016/0022-5193(69)90015-0
10.1109/TCSVT.2022.3140974
10.1109/TCBB.2014.2338313
10.1016/j.matcom.2022.02.029
10.1109/TCSVT.2021.3062947
10.1109/TNNLS.2015.2512849
10.1109/TITS.2021.3129598
10.1016/j.chaos.2021.111318
10.1016/j.ins.2010.11.009
10.1016/j.ins.2019.08.041
10.1016/j.adhoc.2019.101989
10.1007/s11432-019-2813-7
10.1016/j.ins.2014.11.018
10.1016/j.ins.2021.07.096
10.1016/j.sigpro.2022.108527
10.1016/j.optlaseng.2019.04.011
10.1109/TCBB.2019.2914051
10.1109/TII.2020.2992438
10.1016/j.optlastec.2019.105777
10.1016/j.chaos.2022.112770
10.1109/TCSI.2021.3133318
10.1007/s11071-021-06308-3
10.1007/s11071-021-06663-1
10.1016/j.ins.2020.06.030
10.1117/1.JEI.21.1.013014
10.1007/s11042-020-08850-5
10.1007/s11071-018-4391-y
10.1016/j.optlastec.2021.107316
10.1109/TCSVT.2021.3094882
10.1007/s11071-019-05378-8
10.1109/TCSVT.2020.3039112
10.1016/j.jfranklin.2019.10.006
10.1007/s11071-016-2857-3
10.1142/S0218127418501444
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCSVT.2023.3237136
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2205
EndPage 4400
ExternalDocumentID 10_1109_TCSVT_2023_3237136
10018274
Genre orig-research
GrantInformation_xml – fundername: Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund
  grantid: MMJJ20170203
– fundername: Key Research and Development Projects of Liaoning Province
  grantid: 2019020105-JH2/103
  funderid: 10.13039/501100019033
– fundername: National Natural Science Foundation of China
  grantid: 61672124; 61672190
  funderid: 10.13039/501100001809
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
RXW
TAE
TN5
VH1
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c296t-a13b221954f302969a1135d41b9e1d528291b72eba4fa23a5fafd407638e5c9f3
IEDL.DBID RIE
ISICitedReferencesCount 76
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001045167400065&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1051-8215
IngestDate Mon Jun 30 05:51:24 EDT 2025
Sat Nov 29 01:44:21 EST 2025
Tue Nov 18 22:16:48 EST 2025
Wed Aug 27 02:55:14 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c296t-a13b221954f302969a1135d41b9e1d528291b72eba4fa23a5fafd407638e5c9f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7729-1422
0000-0002-3844-3195
0000-0002-3742-5614
0000-0002-0020-6469
PQID 2845760366
PQPubID 85433
PageCount 13
ParticipantIDs crossref_citationtrail_10_1109_TCSVT_2023_3237136
crossref_primary_10_1109_TCSVT_2023_3237136
ieee_primary_10018274
proquest_journals_2845760366
PublicationCentury 2000
PublicationDate 2023-08-01
PublicationDateYYYYMMDD 2023-08-01
PublicationDate_xml – month: 08
  year: 2023
  text: 2023-08-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on circuits and systems for video technology
PublicationTitleAbbrev TCSVT
PublicationYear 2023
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref53
ref52
ref55
ref10
ref54
ref17
s k u (ref28) 2020; 90
ref16
ref19
ref18
ref51
ref50
ref46
ref45
ref48
ref47
ref42
ref41
ref43
ref49
ref8
ref7
wu (ref44) 2011; 1
ref9
ref4
ref3
ref6
ref5
ref40
ref35
ref34
ref37
ref36
ref31
ref33
ref32
ref2
shahna (ref30) 2021; 99
ref1
ref39
ref38
gao (ref11) 2022; 202
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref27
ref29
References_xml – ident: ref32
  doi: 10.1109/ACCESS.2019.2906292
– volume: 99
  year: 2021
  ident: ref30
  article-title: Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion
  publication-title: Signal Process Image Commun
– ident: ref52
  doi: 10.1109/TII.2018.2791944
– ident: ref37
  doi: 10.1007/s11042-022-12220-8
– ident: ref9
  doi: 10.1109/TIFS.2016.2566261
– ident: ref3
  doi: 10.1016/j.ins.2021.10.050
– ident: ref35
  doi: 10.1016/j.sigpro.2021.108041
– ident: ref7
  doi: 10.1007/s00521-018-3913-3
– ident: ref55
  doi: 10.1016/j.ins.2020.09.055
– ident: ref45
  doi: 10.1109/TNNLS.2022.3146570
– volume: 202
  year: 2022
  ident: ref11
  article-title: A 3D model encryption scheme based on a cascaded chaotic system
  publication-title: Signal Process
– ident: ref2
  doi: 10.1109/TII.2020.3014158
– ident: ref14
  doi: 10.1109/TCSVT.2021.3138795
– ident: ref21
  doi: 10.1142/S0218127419500949
– volume: 90
  year: 2020
  ident: ref28
  article-title: A novel image encryption scheme using both pixel level and bit level permutation with chaotic map
  publication-title: Appl Soft Comput
– ident: ref54
  doi: 10.1016/j.ins.2021.12.126
– ident: ref4
  doi: 10.1016/j.ins.2019.10.070
– ident: ref46
  doi: 10.1109/TCSI.2021.3121555
– ident: ref18
  doi: 10.1080/0161-118991863745
– ident: ref16
  doi: 10.1109/TCSVT.2020.3021908
– ident: ref38
  doi: 10.1016/0022-5193(69)90015-0
– ident: ref6
  doi: 10.1109/TCSVT.2022.3140974
– ident: ref42
  doi: 10.1109/TCBB.2014.2338313
– ident: ref43
  doi: 10.1016/j.matcom.2022.02.029
– ident: ref12
  doi: 10.1109/TCSVT.2021.3062947
– ident: ref48
  doi: 10.1109/TNNLS.2015.2512849
– ident: ref47
  doi: 10.1109/TITS.2021.3129598
– ident: ref51
  doi: 10.1016/j.chaos.2021.111318
– ident: ref29
  doi: 10.1016/j.ins.2010.11.009
– ident: ref41
  doi: 10.1016/j.ins.2019.08.041
– ident: ref1
  doi: 10.1016/j.adhoc.2019.101989
– ident: ref39
  doi: 10.1007/s11432-019-2813-7
– ident: ref25
  doi: 10.1016/j.ins.2014.11.018
– ident: ref53
  doi: 10.1016/j.ins.2021.07.096
– ident: ref5
  doi: 10.1016/j.sigpro.2022.108527
– ident: ref24
  doi: 10.1016/j.optlaseng.2019.04.011
– ident: ref40
  doi: 10.1109/TCBB.2019.2914051
– ident: ref19
  doi: 10.1109/TII.2020.2992438
– ident: ref8
  doi: 10.1016/j.optlastec.2019.105777
– ident: ref17
  doi: 10.1016/j.chaos.2022.112770
– ident: ref15
  doi: 10.1109/TCSI.2021.3133318
– volume: 1
  start-page: 31
  year: 2011
  ident: ref44
  article-title: NPCR and UACI randomness tests for image encryption. Cyber journals: Multidisciplinary journals in science and technology
  publication-title: J Sel Areas Telecommun
– ident: ref36
  doi: 10.1007/s11071-021-06308-3
– ident: ref26
  doi: 10.1007/s11071-021-06663-1
– ident: ref34
  doi: 10.1016/j.ins.2020.06.030
– ident: ref23
  doi: 10.1117/1.JEI.21.1.013014
– ident: ref50
  doi: 10.1007/s11042-020-08850-5
– ident: ref27
  doi: 10.1007/s11071-018-4391-y
– ident: ref49
  doi: 10.1016/j.optlastec.2021.107316
– ident: ref13
  doi: 10.1109/TCSVT.2021.3094882
– ident: ref31
  doi: 10.1007/s11071-019-05378-8
– ident: ref10
  doi: 10.1109/TCSVT.2020.3039112
– ident: ref33
  doi: 10.1016/j.jfranklin.2019.10.006
– ident: ref22
  doi: 10.1007/s11071-016-2857-3
– ident: ref20
  doi: 10.1142/S0218127418501444
SSID ssj0014847
Score 2.6299531
Snippet An asynchronous updating Boolean network is employed to simulate and analyze the gene expression of a particular tissue or species, revealing the life activity...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4388
SubjectTerms Algorithms
Bifurcation
Boolean
Boolean functions
Boolean network
Chaos
Chaos theory
Cryptography
Encoding
Encryption
Entropy (Information theory)
Gene expression
image encryption
image processing
NIST
Scrambling (communication)
Security
Tensors
Trajectory
Two dimensional analysis
Title Asynchronous Updating Boolean Network Encryption Algorithm
URI https://ieeexplore.ieee.org/document/10018274
https://www.proquest.com/docview/2845760366
Volume 33
WOSCitedRecordID wos001045167400065&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library
  customDbUrl:
  eissn: 1558-2205
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014847
  issn: 1051-8215
  databaseCode: RIE
  dateStart: 19910101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED7c8EEf_DlxOqUPvkm3pm3axLc5NnwagpvsraRpOgezHd0m7L_3knZDEQXfSpqUcpfk7svlvgO4k4blyxcIUwXTYUZqC5wodiIUeruUav4RU2wiHA7ZZMKfq2R1kwujlDKXz1RbP5pYfpLLtT4q62i-IIYwqga1MAzKZK1dyMBnppoY-gvEZmjIthkyDu-Mei-vo7YuFN72XA9hWfDNCpmyKj_2YmNgBsf__LUTOKo8Satbqv4U9lR2Bodf-AXP4aG73GRS098ivrfGC53KkE2txzyfK5FZw_IKuNXPZLExW4fVnU_zYrZ6e2_AeNAf9Z7sqliCLV0erGxBvNh1NX9b6jnYwgUhHk18EnNFEqoDpiQOXRULPxWuJ2gq0gTRHK4_RSVPvQuoZ3mmLsFyGZPatXLxnS_DIHZinlBs5KhxlqZNIFvhRbJiEtcFLeaRQRQOj4zAIy3wqBJ4E-53YxYlj8afvRtaxF96ltJtQmurpKhaa8sIDSyCJrTEwdUvw67hQH-9vLfXgvqqWKsb2Jcfq9myuDXT6BODjsJu
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED50CuqDPydOp_bBN-lcf6RrfJtjY-Isgp3sraRpOgezHd0m7L_3knZjIgq-lTSh5ZL07uvlvg_ghiuWL5shTGWuTDMSneFC0SMmMNolRPKPKLGJhue5gwF9KYrVVS2MEEIdPhM1ealy-VHK5_JX2Z3kC3IRRm3ClpTOInm51ippYLtKTwwjBkN30ZUta2Tq9M5vvb75NSkVXrNMC4GZ880PKWGVH19j5WI6B_98uUPYL2JJrZlP_hFsiOQY9tYYBk_gvjldJFwS4CLC1_oTWcyQDLWHNB0Llmhefghcayc8W6iPh9YcD9NsNHv_KEO_0_ZbXb2QS9C5SZ2ZzgwrNE3J4BZbdWyhzDAsEtlGSIUREZkyNcKGKUJmx8y0GIlZHCGewx0oCKexdQqlJE3EGWim63IZXJl4z-YNJ6yHNCLYSHHO3TiugLE0XsALLnEpaTEOFKao00AZPJAGDwqDV-B2NWaSM2n82bssTbzWM7duBarLSQqK3TYN0MUibEJf7Jz_Muwadrr-cy_oPXpPF7Arn5Sf4qtCaZbNxSVs88_ZaJpdqSX1BdcIxbk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Asynchronous+Updating+Boolean+Network+Encryption+Algorithm&rft.jtitle=IEEE+transactions+on+circuits+and+systems+for+video+technology&rft.au=Gao%2C+Suo&rft.au=Wu%2C+Rui&rft.au=Wang%2C+Xingyuan&rft.au=Liu%2C+Jiafeng&rft.date=2023-08-01&rft.issn=1051-8215&rft.eissn=1558-2205&rft.volume=33&rft.issue=8&rft.spage=4388&rft.epage=4400&rft_id=info:doi/10.1109%2FTCSVT.2023.3237136&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCSVT_2023_3237136
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1051-8215&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1051-8215&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1051-8215&client=summon