{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:51:45Z","timestamp":1760385105168},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540228431"},{"type":"electronic","value":"9783540286486"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28648-6_101","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T14:38:54Z","timestamp":1292855934000},"page":"633-638","source":"Crossref","is-referenced-by-count":7,"title":["A Combined Hash and Encryption Scheme by Chaotic Neural Network"],"prefix":"10.1007","author":[{"given":"Di","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"101_CR1","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TCSI.2001.972857","volume":"48","author":"F. Dachselt","year":"2001","unstructured":"Dachselt, F., Schwarz, W.: Chaos and Cryptography. IEEE Trans. Circuits and Systems-I\u00a048, 1498\u20131509 (2001)","journal-title":"IEEE Trans. Circuits and Systems-I"},{"key":"101_CR2","first-page":"1459","volume":"2","author":"L.P. Yee","year":"2002","unstructured":"Yee, L.P., Silva, L.C.D.: Application of Multi-layer Perception Network as One-way Hash Function. Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks\u00a02, 1459\u20131462 (2002)","journal-title":"Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks"},{"key":"101_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/S0010-4655(99)00279-9","volume":"121","author":"T. Ohira","year":"1999","unstructured":"Ohira, T.: Encryption with Delayed Dynamics. Computer Physics Communications\u00a0121, 54\u201356 (1999)","journal-title":"Computer Physics Communications"},{"key":"101_CR4","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28648-6_101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:31:48Z","timestamp":1619998308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28648-6_101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540228431","9783540286486"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28648-6_101","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}