{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:23:46Z","timestamp":1725902626956},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615653"},{"type":"electronic","value":"9783319615660"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61566-0_16","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T02:36:53Z","timestamp":1499135813000},"page":"174-180","source":"Crossref","is-referenced-by-count":0,"title":["Personal Data in Cyber Systems Security"],"prefix":"10.1007","author":[{"given":"Marek R.","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Lidia","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"16_CR1","volume-title":"Digital Watermarking and Steganography","author":"IJ Cox","year":"2008","unstructured":"Cox, I.J., Miller, M.L., Bloom, J., Fridrich, J., Kalker, J.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers, Burlington (2008)"},{"key":"16_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.patcog.2016.02.024","volume":"56","author":"Z Jin","year":"2016","unstructured":"Jin, Z., Teoh, A.B.J., Goi, B.-M., Tay, Y.-H.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50\u201362 (2016)","journal-title":"Pattern Recogn."},{"key":"16_CR3","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-642-14464-6_16","volume":"309","author":"L Ogiela","year":"2010","unstructured":"Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Stud. Comput. Intell. 309, 347\u2013369 (2010)","journal-title":"Stud. Comput. Intell."},{"key":"16_CR4","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.neucom.2013.06.001","volume":"122","author":"L Ogiela","year":"2013","unstructured":"Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122, 58\u201369 (2013)","journal-title":"Neurocomputing"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Beginnings of cognitive science. In: Advances in Cognitive Information Systems. Cognitive Systems Monographs, vol. 17, pp. 1\u201318 (2012)","DOI":"10.1007\/978-3-642-25246-4_1"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014) Salerno, Italy, pp. 257\u2013261, 10\u201312 September 2014","DOI":"10.1109\/INCoS.2014.110"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Management Information Systems. LNEE, vol. 331, pp. 449\u2013456. Springer, Heidelberg (2015)","DOI":"10.1007\/978-94-017-9618-7_44"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: FGCN 2008 \u2013 The 2nd International Conference on Future Generation Communication and Networking, Hainan Island, China, vol. 1, pp. 377\u2013380, 13\u201315 December 2008","DOI":"10.1109\/FGCN.2008.89"},{"key":"16_CR9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-02937-0_2","volume":"226","author":"MR Ogiela","year":"2009","unstructured":"Ogiela, M.R., Ogiela, U.: Security of linguistic threshold schemes in multimedia systems. Stud. Comput. Intell. 226, 13\u201320 (2009)","journal-title":"Stud. Comput. Intell."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Shadow Generation Protocol in Linguistic Threshold Schemes. CCIS, vol. 58, pp. 35\u201342. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-10847-1_5"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Grammar Encoding in DNA-Like Secret Sharing Infrastructure. LNCS, vol. 6059, pp. 175\u2013182. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13577-4_15"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing. Springer, London (2014)","DOI":"10.1007\/978-1-4471-5016-9"}],"container-title":["Advances in Intelligent Systems and Computing","Complex, Intelligent, and Software Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61566-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T11:16:52Z","timestamp":1659179812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61566-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615653","9783319615660"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61566-0_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}