{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:42:04Z","timestamp":1743032524671,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030224783"},{"type":"electronic","value":"9783030224790"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22479-0_4","type":"book-chapter","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T23:02:56Z","timestamp":1562194976000},"page":"61-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["That\u2019s My DNA: Detecting Malicious Tampering of Synthesized DNA"],"prefix":"10.1007","author":[{"given":"Diptendu Mohan","family":"Kar","sequence":"first","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,11]]},"reference":[{"key":"4_CR1","unstructured":"Biodefense in the Age of Synthetic Biology. National Academies of Sciences, Engineering and Medicine, Washington, D.C., June 2018"},{"key":"4_CR2","unstructured":"Damerau - Levenshtein Distance. Wikipedia, February 2019"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-36288-6_2","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"JC Choon","year":"2003","unstructured":"Choon, J.C., Hee Cheon, J.: An identity-based signature from Gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18\u201330. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_2"},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/363958.363994","volume":"7","author":"FJ Damerau","year":"1964","unstructured":"Damerau, F.J.: A technique for computer detection and correction of spelling errors. Commun. ACM 7(3), 171\u2013176 (1964)","journal-title":"Commun. ACM"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"De Caro, A., Iovino, V.: jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, pp. 850\u2013855. IEEE, Kerkyra, Corfu, Greece, 28 June\u20131 July 2011","DOI":"10.1109\/ISCC.2011.5983948"},{"issue":"5987","key":"4_CR6","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1126\/science.1190719","volume":"329","author":"DG Gibson","year":"2010","unstructured":"Gibson, D.G., et al.: Creation of a bacterial cell controlled by a chemically synthesized genome. Science 329(5987), 52\u201356 (2010)","journal-title":"Science"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1186\/1471-2105-8-176","volume":"8","author":"D Heider","year":"2007","unstructured":"Heider, D., Barnekow, A.: DNA-based watermarks using the DNA-Crypt algorithm. BMC Bioinf. 8(1), 176 (2007)","journal-title":"BMC Bioinf."},{"issue":"6280","key":"4_CR8","doi-asserted-by":"publisher","first-page":"aad6253","DOI":"10.1126\/science.aad6253","volume":"351","author":"CA Hutchison","year":"2016","unstructured":"Hutchison, C.A., et al.: Design and synthesis of a minimal bacterial genome. Science 351(6280), aad6253 (2016)","journal-title":"Science"},{"issue":"140","key":"4_CR9","first-page":"241","volume":"37","author":"P Jaccard","year":"1901","unstructured":"Jaccard, P.: Distribution de la Flore Alpine dans le Bassin des Dranses et dans quelques r\u00e9gions voisines. Bulletin de la Societe Vaudoise des Sciences Naturelles 37(140), 241\u201372 (1901)","journal-title":"Bulletin de la Societe Vaudoise des Sciences Naturelles"},{"issue":"142","key":"4_CR10","first-page":"547","volume":"37","author":"P Jaccard","year":"1901","unstructured":"Jaccard, P.: Etude De La Distribution Florale Dans Une Portion Des Alpes Et Du Jura. Bulletin de la Societe Vaudoise des Sciences Naturelles 37(142), 547\u2013579 (1901)","journal-title":"Bulletin de la Societe Vaudoise des Sciences Naturelles"},{"issue":"406","key":"4_CR11","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1080\/01621459.1989.10478785","volume":"84","author":"MA Jaro","year":"1989","unstructured":"Jaro, M.A.: Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida. J. Am. Stat. Assoc. 84(406), 414\u2013420 (1989)","journal-title":"J. Am. Stat. Assoc."},{"issue":"6","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.ppat.1000950","volume":"6","author":"DC Jupiter","year":"2010","unstructured":"Jupiter, D.C., Ficht, T.A., Samuel, J., Qin, Q.M., de Figueiredo, P.: DNA watermarking of infectious agents: progress and prospects. PLOS Pathog. 6(6), 1\u20133 (2010)","journal-title":"PLOS Pathog."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Kar, D.M., Ray, I., Gallegos, J., Peccoud, J.: Digital signatures to ensure the authenticity and integrity of synthetic DNA Molecules. In: Proceedings of the New Security Paradigms Workshop, NSPW 2018, pp. 110\u2013122. ACM, Windsor (2018)","DOI":"10.1145\/3285002.3285007"},{"issue":"8","key":"4_CR14","first-page":"707","volume":"10","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions, and reversals. Sov. Phys. Dokl. 10(8), 707\u2013710 (1966)","journal-title":"Sov. Phys. Dokl."},{"issue":"8","key":"4_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0042465","volume":"7","author":"M Liss","year":"2012","unstructured":"Liss, M., et al.: Embedding permanent watermarks in synthetic genes. PLOS ONE 7(8), 1\u201310 (2012)","journal-title":"PLOS ONE"},{"key":"4_CR16","unstructured":"Ney, P., Koscher, K., Organick, L., Ceze, L., Kohno, T.: Computer security, privacy, and DNA sequencing: compromising computers with synthesized DNA, privacy leaks, and more. In: Proceedings of the 26th USENIX Security Symposium, Vancouver, Canada, August 2017"},{"issue":"18","key":"4_CR17","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1049\/el:20020682","volume":"38","author":"KG Paterson","year":"2002","unstructured":"Paterson, K.G.: ID-based signatures from pairings on elliptic curves. Electron. Lett. 38(18), 1025\u20131026 (2002)","journal-title":"Electron. Lett."},{"issue":"9","key":"4_CR18","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6","volume":"27","author":"JS Plank","year":"1997","unstructured":"Plank, J.S., et al.: A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw. Pract. Exper. 27(9), 995\u20131012 (1997)","journal-title":"Softw. Pract. Exper."},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"IS Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300\u2013304 (1960)","journal-title":"J. Soc. Ind. Appl. Math."},{"issue":"6329","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1126\/science.aaf4557","volume":"355","author":"SM Richardson","year":"2017","unstructured":"Richardson, S.M., et al.: Design of a synthetic yeast genome. Science 355(6329), 1040\u20131044 (2017)","journal-title":"Science"},{"key":"4_CR21","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Proceedings of the 2000 Symposium on Cryptography and Information Security. Okinawa, Japan, January 2000"},{"key":"4_CR22","unstructured":"Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. IACR Cryptology ePrint Archive (2003)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"issue":"2","key":"4_CR24","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/LCOMM.2002.808397","volume":"7","author":"X Yi","year":"2003","unstructured":"Yi, X.: An identity-based signature scheme from the Weil pairing. IEEE Commun. Lett. 7(2), 76\u201378 (2003)","journal-title":"IEEE Commun. Lett."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22479-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:08:07Z","timestamp":1710259687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22479-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030224783","9783030224790"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22479-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Charleston, SC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2019.cse.sc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}