{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:20:07Z","timestamp":1739510407733,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_35","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"281-288","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Text Complexity in a Crypto System \u2013 A Case Study on Telugu"],"prefix":"10.1007","author":[{"given":"M. S. V. S. Bhadri","family":"Raju","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B. Vishnu","family":"Vardhan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. A.","family":"Naidu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L. Pratap","family":"Reddy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. Vinaya","family":"Babu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MIC.2003.1200294","volume":"3","author":"A. Stone","year":"2003","unstructured":"Stone, A.: Internationalizing the Internet. J. Internet Computing\u00a03, 11\u201312 (2003)","journal-title":"J. Internet Computing"},{"key":"35_CR2","unstructured":"Pratap Reddy, L.: A New Scheme for Information Interchange in Telugu through Computer Networks: Doctoral Thesis. JNTU, Hyderabad, India (2001)"},{"key":"35_CR3","unstructured":"Vishnu Vardhan, B.: Analysis of N Gram Model on Telugu Document Classification. Doctoral Thesis. JNTU, Hyderabad, India (2007)"},{"key":"35_CR4","unstructured":"Lee, K.W., Teh, C.E., Tan, Y.L.: Decrypting English Text Using Enhanced Frequency Analysis. In: National Seminar on Science, Technology and Social Sciences (UiTM-STSS 2006), pp. 1\u20137 (2006)"},{"key":"35_CR5","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1080\/0161-119591883944","volume":"3","author":"T. Jakobsen","year":"1995","unstructured":"Jakobsen, T.: A fast Method for Cryptanalysis of Subsittution Ciphers. J. Cryptologia XIX\u00a03, 265\u2013274 (1995)","journal-title":"J. Cryptologia XIX"},{"key":"35_CR6","volume-title":"Decrypted secrets-Methods and Maxims of Cryptology","author":"F.L. Bauer","year":"2007","unstructured":"Bauer, F.L.: Decrypted secrets-Methods and Maxims of Cryptology. Springer, Heidelberg (2007)"},{"key":"35_CR7","volume-title":"Handbook of Applied Cryptography","author":"A.J.P. Menezes","year":"2001","unstructured":"Menezes, A.J.P.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"De Canniere, C., Biryukov, A., Preneel: An Introduction to Block Cipher Cryptanalysis. J. IEEE\u00a094(2) (2006)","DOI":"10.1109\/JPROC.2005.862300"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"B\u00e1rbara, E., Rinza, S., Alejandra, D., Zavala, B., Chavez, A.C.: De-encryption of a text in spanish using probability and statistics. In: 18th IEEE International Conference on Electronics, Communications and Computers, pp. 75\u201377 (2008)","DOI":"10.1109\/CONIELECOMP.2008.38"},{"key":"35_CR10","unstructured":"Guan, B.-C., Chang, R.-I., Wei, Y.C., Hu, C.-L., Chiu, Y.-L.: An encryption scheme for large Chinese texts. In: IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, Taipei, Taiwan, pp. 564\u2013568 (2003)"},{"key":"35_CR11","first-page":"682","volume":"8","author":"M.H. Shirali-Shahreza","year":"2008","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: Steganography in Persian and Arabic Unicode Texts Using Pseudo-Space and Pseudo-Connection Characters. J. Theoretical and Applied Information Technology (JATIT)\u00a08, 682\u2013687 (2008)","journal-title":"J. Theoretical and Applied Information Technology (JATIT)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A New Approach to Persian\/Arabic Text Steganography. In: 5th IEEE\/ACIS International Conference on Computer and Information Science (ICIS 2006), Honolulu, HI, USA, pp. 310\u2013315 (2006)","DOI":"10.1109\/ICIS-COMSAR.2006.10"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T13:21:35Z","timestamp":1739452895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}