{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:56:09Z","timestamp":1725868569801},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_24","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"253-257","source":"Crossref","is-referenced-by-count":0,"title":["Application of Personalized Cryptography in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Marek R.","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Lidia","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Cognitive systems for intelligent business information management in cognitive economy. International Journal of Information Management, 34 (2014) 751-760","DOI":"10.1016\/j.ijinfomgt.2014.08.001"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Hachaj, T., Ogiela, M.R.: CAD system for automatic analysis of CT perfusion maps. Opto-Electronic Review, 19 (2011) 95-103","DOI":"10.2478\/s11772-010-0071-2"},{"key":"24_CR3","unstructured":"Shi, J., Lam, K-Y.: VitaCode: Electrocardiogram Representation for Biometric Cryptography in Body Area Networks. 1st International Conference on Ubiquitous and Future Networks, Hong Kong, China, Jun 07-09 (2009) 112-115"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Ogiela, L.: Semantic analysis and biological modelling in selected classes of cognitive information systems. Mathematical and Computer Modelling, 58 (2013) 1405-1414","DOI":"10.1016\/j.mcm.2012.12.001"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Kumar, A., Kumar, A.: Adaptive management of multimodal biometrics fusion using ant colony optimization. Information Fusion 32 (2016) 49\u201363","DOI":"10.1016\/j.inffus.2015.09.002"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Shi, J., Lam, K-Y.: VitaCode: Electrocardiogram Representation for Biometric Cryptography in Body Area Networks. 1st International Conference on Ubiquitous and Future Networks, Hong Kong, China, Jun 07-09 (2009) 112-115","DOI":"10.1109\/ICUFN.2009.5174295"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Cognitive systems and bio-inspired computing in homeland security. Journal of Network and Computer Applications, 38 (2014) 34-42","DOI":"10.1016\/j.jnca.2013.05.005"},{"key":"24_CR8","unstructured":"Ogiela, M.R., Ogiela, U.: Linguistic Approach to Cryptographic Data Sharing, FGCN 2008 \u2013 The 2nd International Conference on Future Generation Communication and Networking, December 13-15, 2008, Hainan Island, China, 1 (2008) 377\u2013380"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Bajwa, G., Dantu, R.: Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms. Computers & Security 62 (2016) 95-113","DOI":"10.1016\/j.cose.2016.06.001"},{"key":"24_CR10","unstructured":"Hani, M.K., Marsono, M.N., Bakhteri, R.: Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Generation Comp. Syst. (2013) 800\u2013810"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Nandakumar, A.K.J.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. In: IEEE Transactions on Information Forensics and Security. 2 (2007) 744\u2013757","DOI":"10.1109\/TIFS.2007.908165"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Grammar Encoding in DNA-Like Secret Sharing Infrastructure. 2nd International Conference on Advanced Science and Technology (AST), Miyazaki, Japan, Jun 23-25, 2010. LNCS 6059, (2010) 175-182","DOI":"10.1007\/978-3-642-13577-4_15"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Shadow Generation Protocol in Linguistic Threshold Schemes. in: D. Slezak, T.H. Kim., W.C. Tang et all., Security Technology, Communications in Computer and Information Science 58 (2009) 35-42","DOI":"10.1007\/978-3-642-10847-1_5"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Ogiela, L.: Towards cognitive economy. Soft Computing 18 (2014) 1675-1683","DOI":"10.1007\/s00500-014-1230-z"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Management Information Systems. in: J.J. Park, Y. Pan, H.C. Chao, et all., 2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN), South Korea, 07-10 July 2014, Ubiquitous Computing Application and Wireless Sensor, Lecture Notes in Electrical Engineering 331 (2015) 449-456","DOI":"10.1007\/978-94-017-9618-7_44"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122 (2013) 58-69","DOI":"10.1016\/j.neucom.2013.06.001"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Ogiela, L.: Cognitive Computational Intelligence in Medical Pattern Semantic Understanding. in: M. Guo, L. Zhao, L. Wang (Eds.), Fourth International Conference on Natural Computation, ICNC 2008, Jinan, Shandong, China, 18-20 October, 2008, 245-247","DOI":"10.1109\/ICNC.2008.714"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Ogiela, L.: Computational Intelligence in Cognitive Healthcare Information Systems. in: I. Bichindaritz, S. Vaidya, A. Jain et all., Computational Intelligence in Healthcare 4: Advanced Methodologies, Studies in Computational Intelligence 309 (2010) 347-369","DOI":"10.1007\/978-3-642-14464-6_16"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Ogiela, L.: Data management in cognitive financial systems. International Journal of Information Management 33 (2013) 263-270","DOI":"10.1016\/j.ijinfomgt.2012.11.008"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:47:07Z","timestamp":1498355227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_24","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}