{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:18:10Z","timestamp":1743049090359,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319922690"},{"type":"electronic","value":"9783319922706"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92270-6_10","type":"book-chapter","created":{"date-parts":[[2018,6,8]],"date-time":"2018-06-08T17:14:01Z","timestamp":1528478041000},"page":"71-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Human Genome Data Protection Using PostgreSQL DBMS"],"prefix":"10.1007","author":[{"given":"P\u00e9ter","family":"Lehotay-K\u00e9ry","sequence":"first","affiliation":[]},{"given":"Attila","family":"Kiss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,9]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71913-7","volume-title":"Algorithmic Aspects of Bioinformatics","author":"H-J Bockenhauer","year":"2007","unstructured":"Bockenhauer, H.-J., Bongartz, D.: Algorithmic Aspects of Bioinformatics. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71913-7"},{"key":"10_CR2","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2014)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-319-66917-5_27","volume-title":"Advances in Databases and Information Systems","author":"RN Lichtenwalter","year":"2017","unstructured":"Lichtenwalter, R.N., Zorina-Lichtenwalter, K., Diatchenko, L.: Genotypic data in relational databases: efficient storage and rapid retrieval. In: Kirikova, M., N\u00f8rv\u00e5g, K., Papadopoulos, G.A. (eds.) ADBIS 2017. LNCS, vol. 10509, pp. 408\u2013421. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66917-5_27"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Aniceto, R., Xavier, R., Guimar\u00e3es, V., Hondo, F., Holanda, M., Walter, M.E., Lifschitz, S.: Evaluating the Cassandra NoSQL database approach for genomic data persistency. Int. J. Genomics 2015 (2015)","DOI":"10.1155\/2015\/502795"},{"issue":"4","key":"10_CR5","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1187\/cbe.03-09-0012","volume":"3","author":"M Rice","year":"2004","unstructured":"Rice, M., Gladstone, W., Weir, M.: Relational databases: a transparent framework for encouraging biology students to think informatically. Cell Biol. Educ. 3(4), 241\u2013252 (2004)","journal-title":"Cell Biol. Educ."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Leurent, G.: On the practical (in-) security of 64-bit block ciphers: collision attacks on HTTP over TLS and OpenVPN. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 456\u2013467. ACM (2016)","DOI":"10.1145\/2976749.2978423"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-25385-0_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344\u2013371. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_19"},{"key":"10_CR8","series-title":"IFMBE Proceedings","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-981-10-7419-6_12","volume-title":"Precision Medicine Powered by pHealth and Connected Health","author":"P Mytis-Gkometh","year":"2018","unstructured":"Mytis-Gkometh, P., Drosatos, G., Efraimidis, P.S., Kaldoudi, E.: Notarization of knowledge retrieval from biomedical repositories using blockchain technology. In: Maglaveras, N., Chouvarda, I., de Carvalho, P. (eds.) Precision Medicine Powered by pHealth and Connected Health. IP, vol. 66, pp. 69\u201373. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-7419-6_12"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume-title":"Fast Software Encryption","author":"B Schneier","year":"1994","unstructured":"Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191\u2013204. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-58108-1_24"},{"key":"10_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2013","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-662-04722-4"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Barker, E.: SP 800\u201367 Rev. 2, Recommendation for Triple Data Encryption Algorithm (TDEA) Block Cipher. NIST Special Publication 800:67 (2017)","DOI":"10.6028\/NIST.SP.800-67r2"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Adams, C.: The cast-128 encryption algorithm (1997)","DOI":"10.17487\/rfc2144"}],"container-title":["Communications in Computer and Information Science","HCI International 2018 \u2013 Posters' Extended Abstracts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92270-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:37:12Z","timestamp":1657154232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92270-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319922690","9783319922706"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92270-6_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Vegas, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hci2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}