{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:31:04Z","timestamp":1743096664004,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031276217"},{"type":"electronic","value":"9783031276224"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27622-4_26","type":"book-chapter","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:15:28Z","timestamp":1679879728000},"page":"345-354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Security Algorithm BR22-01 Used to Secure the COVID\u201919 Health Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4622-753X","authenticated-orcid":false,"given":"C.","family":"Bagath Basha","sequence":"first","affiliation":[]},{"given":"S.","family":"Rajaprakash","sequence":"additional","affiliation":[]},{"given":"M.","family":"Nithya","sequence":"additional","affiliation":[]},{"given":"C.","family":"Sunitha","sequence":"additional","affiliation":[]},{"given":"K.","family":"Karthik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,19]]},"reference":[{"key":"26_CR1","first-page":"591","volume":"8","author":"C Bagath Basha","year":"2019","unstructured":"Bagath Basha, C., Somasundaram, K.: A comparative study of twitter sentiment analysis using machine learning algorithms in big data. Int. J. Recent Technol. Eng. 8, 591\u2013599 (2019)","journal-title":"Int. J. Recent Technol. Eng."},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.37418\/amsj.9.3.33","volume":"9","author":"C Bagath Basha","year":"2020","unstructured":"Bagath Basha, C., Rajaprakash, S.: Applying the CBB21 phase 2 method for securing Twitter analyzed data. Adv. Math. Sci. J. 9, 1085\u20131091 (2020)","journal-title":"Adv. Math. Sci. J."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Bagath Basha, C., Rajaprakash, S., Muthuselvan, S., Saisatishsunder, P., Alekhya Rani, S.V.L.: Applying the CBB20 algorithm for twitter analyzed data. In: Proceedings of First International Conference on Advances in Physical Sciences and Materials, Coimbatore, Tamil Nadu, India (2020)","DOI":"10.1088\/1742-6596\/1706\/1\/012164"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Bagath Basha, C., Rajaprakash, S.: Applying the SRB21 phase ii methodology for securing Twitter analyzed data. In: Proceedings of the International Confererence on Mechanical Electronics and Computer Engineering (2020)","DOI":"10.1063\/5.0024904"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"103125","DOI":"10.1016\/j.micpro.2020.103125","volume":"77","author":"C Bagath Basha","year":"2020","unstructured":"Bagath Basha, C., Rajapraksh, S.: Enhancing the security using SRB18 method of embedding computing. Microprocess. Microsyst. 77, 103125 (2020)","journal-title":"Microprocess. Microsyst."},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Rajaprakash, S., Bagath Basha, C., Muthuselvan, S., Jaisankar, N., Singh, R.P.: RBJ25 cryptography algorithm for securing big data. In: Proceedings of First International Conference on Advances in Physical Sciences and Materials, Coimbatore, Tamil Nadu, India (2020)","DOI":"10.1088\/1742-6596\/1706\/1\/012146"},{"issue":"3","key":"26_CR7","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.37418\/amsj.9.3.41","volume":"9","author":"K Karthik","year":"2020","unstructured":"Karthik, K., Bagath Basha, C., Bhaswanth Thilak, U., Sai Kiran, T., Raj, J.: Securing social media analyzed data using RB20 method. Adv. Math. Sci. J. 9(3), 1157\u20131163 (2020)","journal-title":"Adv. Math. Sci. J."},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.37418\/amsj.9.3.34","volume":"9","author":"C Bagath Basha","year":"2020","unstructured":"Bagath Basha, C., Rajaprakash, S., Harish, V.V.A., Krishna, M.S., Prabhas, K.: Securing Twitter analysed data using CBB22 algorithm. Adv. Math. Sci. J. 9, 1093\u20131100 (2020)","journal-title":"Adv. Math. Sci. J."},{"key":"26_CR9","first-page":"1952","volume":"8","author":"C Bagath Basha","year":"2019","unstructured":"Bagath Basha, C., Rajaprakash, S.: Securing Twitter data using SRB21 phase I methodology. Int. J. Sci. Technol. Res. 8, 1952\u20131955 (2019)","journal-title":"Int. J. Sci. Technol. Res."},{"key":"26_CR10","unstructured":"Jaichandran, R., Bagath Basha, C., Shunmuganathan, K.L., Rajaprakash, S., Kanagasuba Raja, S.: Sentiment analysis of movies on social media using R studio. Int. J. Eng. Adv. Technol. 8 (2019)"},{"key":"26_CR11","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-981-16-6369-7_46","volume-title":"Intelligent Sustainable Systems","author":"S Rajaprakash","year":"2022","unstructured":"Rajaprakash, S., Jaishanker, N., Basha, C.B., Muhuselvan, S., Aswathi, A.B., Jayan, A., Sebastian, G.: RBJ20 cryptography algorithm for securing big data communication using wireless networks. In: Nagar, A.K., Jat, D.S., Mar\u00edn-Ravent\u00f3s, G., Mishra, D.K. (eds.) Intelligent Sustainable Systems. LNNS, vol. 334, pp. 499\u2013507. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-6369-7_46 ISSN 237-3370"},{"issue":"102748","key":"26_CR12","first-page":"1","volume":"58","author":"D Polap","year":"2021","unstructured":"Polap, D., Srivastava, G., Yu, K.: Agent architecture of an intelligent medical system based on federated learning and blockchain technology. J. Inf. Secur. Appl. 58(102748), 1\u20138 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"102936","key":"26_CR13","first-page":"1","volume":"61","author":"J Huang","year":"2021","unstructured":"Huang, J., Tan, L., Li, W., Yu, K.: RON-enhanced blockchain propagation mechanism for edge-enabled smart cities. J. Inf. Secur. Appl. 61(102936), 1\u201310 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"26_CR14","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TNSE.2021.3101842","volume":"9","author":"L Tan","year":"2021","unstructured":"Tan, L., Yu, K., Shi, N., Yang, C., Wei, W., Lu, H.: Towards secure and privacy-preserving data sharing for COVID-19 medical records: a blockchain-empowered approach. IEEE Trans. Netw. Sci. Eng. 9, 271\u2013281 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."}],"container-title":["Communications in Computer and Information Science","Deep Sciences for Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27622-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:32:46Z","timestamp":1679880766000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27622-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031276217","9783031276224"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27622-4_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IconDeepCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Deep Sciences for Computing and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icondeepcom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.srmist.edu.in\/icondeepcom-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}