{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:55Z","timestamp":1725902935903},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_37","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"395-400","source":"Crossref","is-referenced-by-count":8,"title":["Security of Selected Secret Sharing Schemes"],"prefix":"10.1007","author":[{"given":"Urszula","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Makoto","family":"Takizawa","sequence":"additional","affiliation":[]},{"given":"Lidia","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-02937-0_2","volume":"226","author":"MR Ogiela","year":"2009","unstructured":"Ogiela, M.R., Ogiela, U.: Security of linguistic threshold schemes in multimedia systems. Stud. Comput. Intel. 226, 13\u201320 (2009)","journal-title":"Stud. Comput. Intel."},{"key":"37_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-13577-4_15","volume-title":"Advances in Computer Science and Information Technology","author":"MR Ogiela","year":"2010","unstructured":"Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. In: Kim, T., Adeli, H. (eds.) ACN\/AST\/ISA\/UCMA -2010. LNCS, vol. 6059, pp. 175\u2013182. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13577-4_15"},{"key":"37_CR3","volume-title":"Computational Number Theory and Modern Cryptography","author":"SY Yan","year":"2013","unstructured":"Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)"},{"key":"37_CR4","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-642-14464-6_16","volume":"309","author":"L Ogiela","year":"2010","unstructured":"Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Stud. Comput. Intel. 309, 347\u2013369 (2010)","journal-title":"Stud. Comput. Intel."},{"key":"37_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-25246-4_1","volume":"17","author":"L Ogiela","year":"2012","unstructured":"Ogiela, L., Ogiela, M.R.: Beginnings of cognitive science, in advances in cognitive information systems. Cogn. Syst. Monogr. 17, 1\u201318 (2012)","journal-title":"Cogn. Syst. Monogr."},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: The 2nd International Conference on Future Generation Communication and Networking, FGCN 2008, Hainan Island, China, 13\u201315 December 2008, vol. 1, pp. 377\u2013380 (2008)","DOI":"10.1109\/FGCN.2008.89"},{"issue":"4","key":"37_CR7","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1007\/s10586-012-0239-2","volume":"16","author":"T Ohkawara","year":"2013","unstructured":"Ohkawara, T., Aikebaier, A., Enokido, T., Takizawa, M.: Quorum-based synchronization protocols for multimedia replicas. Int. J. Cluster Comput. 16(4), 979\u2013988 (2013)","journal-title":"Int. J. Cluster Comput."},{"key":"37_CR8","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.neucom.2013.06.001","volume":"122","author":"L Ogiela","year":"2013","unstructured":"Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122, 58\u201369 (2013)","journal-title":"Neurocomputing"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), Salerno, Italy, 10\u201312 September 2014, pp. 257\u2013261 (2014)","DOI":"10.1109\/INCoS.2014.110"},{"key":"37_CR10","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-94-017-9618-7_44","volume-title":"Ubiquitous Computing Application and Wireless Sensor","author":"L Ogiela","year":"2015","unstructured":"Ogiela, L., Ogiela, M.R.: Management information systems. In: Park, J., Pan, Y., Chao, H.-C., Yi, G. (eds.) Ubiquitous Computing Application and Wireless Sensor. LNEE, vol. 331, pp. 449\u2013456. Springer, Dordrecht (2015). doi: 10.1007\/978-94-017-9618-7_44"},{"issue":"2\/3","key":"37_CR11","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1504\/IJAHUC.2014.065773","volume":"17","author":"D Duolikun","year":"2014","unstructured":"Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Design and evaluation of a quorum-based synchronization protocol of multimedia replicas. Int. J. Ad Hoc Ubiquitous Comput. 17(2\/3), 100\u2013109 (2014)","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"37_CR12","volume-title":"Security Practitioner and Cryptography Handbook and Study Guide Set","author":"M Gregg","year":"2014","unstructured":"Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Secure information management using linguistic threshold approach. In: Advanced Information and Knowledge Processing. Springer, London (2014)","DOI":"10.1007\/978-1-4471-5016-9"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Shadow generation protocol in linguistic threshold schemes. In: Communication in Computer and Information Science, vol. 58, pp. 35\u201342 (2009)","DOI":"10.1007\/978-3-642-10847-1_5"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T06:55:22Z","timestamp":1569653722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}