{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:20:05Z","timestamp":1742912405260,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030571146"},{"type":"electronic","value":"9783030571153"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57115-3_17","type":"book-chapter","created":{"date-parts":[[2020,8,10]],"date-time":"2020-08-10T16:04:31Z","timestamp":1597075471000},"page":"199-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Genetic Algorithm-Based DES Key Generation Scheme"],"prefix":"10.1007","author":[{"given":"Min-Yan","family":"Tsai","sequence":"first","affiliation":[]},{"given":"Hsin-Hung","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Chi-Yuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,11]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1049\/iet-net.2018.5026","volume":"8","author":"A Suliman","year":"2019","unstructured":"Suliman, A., Husain, Z., Abououf, M., Alblooshi, M., Salah, K.: Monetization of IoT data using smart contracts. IET Netw. 8(1), 32\u201337 (2019)","journal-title":"IET Netw."},{"issue":"7","key":"17_CR2","first-page":"2189","volume":"20","author":"Z Min","year":"2019","unstructured":"Min, Z., Yang, G., Wang, J., Kim, G.: A privacy-preserving BGN-type parallel homomorphic encryption algorithm based on LWE. J. Internet Technol. 20(7), 2189\u20132200 (2019)","journal-title":"J. Internet Technol."},{"issue":"5","key":"17_CR3","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1049\/iet-net.2017.0180","volume":"7","author":"M Boussif","year":"2018","unstructured":"Boussif, M., Aloui, N., Cherif, A.: Secured cloud computing for medical data based on watermarking and encryption. IET Netw. 7(5), 294\u2013298 (2018)","journal-title":"IET Netw."},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"1840","DOI":"10.1109\/JSYST.2019.2956070","volume":"14","author":"C Zhang","year":"2019","unstructured":"Zhang, C., Cho, H.-H., Chen, C.-Y., Shih, T.K., Chao, H.-C.: Fuzzy-based 3D stream traffic lightweighting over mobile P2P network. IEEE Syst. J. 14(2), 1840\u20131851 (2019)","journal-title":"IEEE Syst. J."},{"issue":"6","key":"17_CR5","first-page":"375","volume":"9","author":"MI Nazeer","year":"2018","unstructured":"Nazeer, M.I., Mallah, G.A., Shaikh, N.A., Bhatra, R., Memon, R.A., Mangrio, M.I.: Implication of genetic algorithm in cryptography to enhance security. (IJACSA) Int. J. Adv. Comput. Sci. App. 9(6), 375\u2013379 (2018)","journal-title":"(IJACSA) Int. J. Adv. Comput. Sci. App."},{"unstructured":"DES. https:\/\/github.com\/nkengasongatem\/java-des-mplementation. Accessed Dec 2019","key":"17_CR6"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"2","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 2, 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"04","key":"17_CR8","doi-asserted-by":"publisher","first-page":"1850028","DOI":"10.1142\/S0219691318500285","volume":"16","author":"SP Raja","year":"2018","unstructured":"Raja, S.P.: Secured medical image compression using DES encryption technique in bandelet multiscale transform. Int. J. Wavelets Multiresolut. Inf. Process. 16(04), 1850028 (2018)","journal-title":"Int. J. Wavelets Multiresolut. Inf. Process."},{"issue":"10","key":"17_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijmecs.2016.10.01","volume":"8","author":"MEL Estrellado","year":"2016","unstructured":"Estrellado, M.E.L., Sison, A.M., Tanguilig III, B.T.: Test bank management system applying rasch model and data encryption standard (DES) algorithm. Int. J. Mod. Educ. Comput. Sci. 8(10), 1\u20138 (2016)","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/JSYST.2013.2256731","volume":"8","author":"CW Tsai","year":"2014","unstructured":"Tsai, C.W., Rodrigues, J.J.: Metaheuristic scheduling for cloud: a survey. IEEE Syst. J. 8(1), 279\u2013291 (2014)","journal-title":"IEEE Syst. J."},{"issue":"12","key":"17_CR11","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1002\/sec.354","volume":"7","author":"C Chen","year":"2014","unstructured":"Chen, C., Chao, H.: A survey of key distribution in wireless sensor networks. Secur. Commun. Netw. 7(12), 2495\u20132508 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"17_CR12","first-page":"1479","volume":"19","author":"L Deng","year":"2018","unstructured":"Deng, L., Yang, Y., Chen, Y., Wang, X.: Aggregate signature without pairing from certificateless cryptography. J. Internet Technol. 19(5), 1479\u20131486 (2018)","journal-title":"J. Internet Technol."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"18734","DOI":"10.1109\/ACCESS.2019.2896256","volume":"7","author":"Y Niu","year":"2019","unstructured":"Niu, Y., Zhang, J., Wang, A., Chen, C.: An efficient collision power attack on AES encryption in edge computing. IEEE Access 7, 18734\u201318748 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption - how to encrypt with RSA. In: Proceeding of Eurocrypt, pp. 92\u2013111 (1994)","key":"17_CR14","DOI":"10.1007\/BFb0053428"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537\u2013554. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_34"},{"issue":"2","key":"17_CR16","first-page":"301","volume":"17","author":"L Marin","year":"2016","unstructured":"Marin, L.: Fast generation of DES-like S-boxes. J. Internet Technol. 17(2), 301\u2013308 (2016)","journal-title":"J. Internet Technol."},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/MNET.2019.1700210","volume":"33","author":"H-C Chao","year":"2019","unstructured":"Chao, H.-C., Cho, H.-H., Shih, T.K., Chen, C.-Y.: Bacteria-inspired network for 5G mobile communication. IEEE Netw. 33(4), 138\u2013145 (2019)","journal-title":"IEEE Netw."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Bio-inspired Information and Communication Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57115-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T04:30:27Z","timestamp":1619238627000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57115-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030571146","9783030571153"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57115-3_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-inspired Information and Communication Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bionetics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bionetics.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held online due to COVID -19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}