{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:50:28Z","timestamp":1743133828870,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642166983"},{"type":"electronic","value":"9783642166990"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16699-0_4","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:55:31Z","timestamp":1288691731000},"page":"27-33","source":"Crossref","is-referenced-by-count":3,"title":["Using Chaotic System in Encryption"],"prefix":"10.1007","author":[{"given":"O\u011fuz","family":"Findik","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"\u015eirzat","family":"Kahramanli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1016\/S0169-7552(97)00100-1","volume":"29","author":"C.I. Dalton","year":"1997","unstructured":"Dalton, C.I., Griffin, J.F.: Applying military grade security to the Internet. Elsevier Computer Networks and ISDN Systems\u00a029, 1799\u20131808 (1997)","journal-title":"Elsevier Computer Networks and ISDN Systems"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1016\/S1389-1286(98)00016-4","volume":"31","author":"R. Molva","year":"1999","unstructured":"Molva, R.: Internet security architecture. Computer Networks\u00a031, 787\u2013804 (1999)","journal-title":"Computer Networks"},{"key":"4_CR3","first-page":"5","volume":"3","author":"A. Pasquinucci","year":"2007","unstructured":"Pasquinucci, A.: Web voting, security and cryptography. Computer Fraud & Security\u00a03, 5\u20138 (2007)","journal-title":"Computer Fraud & Security"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Ahmad, D.R.M., Dubrawsky, I., et al.: Cryptography, Hack Proofing Your Network, 2nd edn., pp. 165\u2013203 (2002)","DOI":"10.1016\/B978-192899470-1\/50009-4"},{"issue":"1","key":"4_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S1005-8885(08)60181-8","volume":"16","author":"M. Ning-bo","year":"2009","unstructured":"Ning-bo, M., Yu-pu, H., Hai-wen, O.: Broadcast encryption schemes based on RSA. The Journal of China Universities of Posts and Telecommunications\u00a016(1), 69\u201375 (2009)","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0167-9260(02)00053-6","volume":"34","author":"L. Batinaa","year":"2003","unstructured":"Batinaa, L., Ors, S.B., Preneel, B., Vandewalle, J.: Hardware architectures for public key cryptography. Integration, the VLSI Journal\u00a034, 1\u201364 (2003)","journal-title":"Integration, the VLSI Journal"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(00)11015-2","volume":"11","author":"D. Herson","year":"2000","unstructured":"Herson, D.: The Changing Face of International Cryptography Policy: Part 15 \u2013 Trusted Third Parties. Computer Fraud & Security\u00a011(1), 6\u20137 (2000)","journal-title":"Computer Fraud & Security"},{"key":"4_CR8","unstructured":"Gleick, J.: Kaos. Tubitak Press (1995)"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"E. Lorenz","year":"1963","unstructured":"Lorenz, E.: J. Atmos\u00a0S.20, 130 (1963)","journal-title":"J. Atmos"},{"key":"4_CR10","unstructured":"F\u0131nd\u0131k, O.: Use Of Chaotic Syste. In: Cryptography, Master thesis, Selcuk University, 86 p (2004)"},{"key":"4_CR11","unstructured":"Kodaz, H.: Cryptography in data communication for security, Master thesis, Selcuk University (2002)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Lorenz, E.N.: The essence of chaos, University of Washington Press, Washington (1993)","DOI":"10.4324\/9780203214589"}],"container-title":["Communications in Computer and Information Science","Advances in Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16699-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:11:15Z","timestamp":1559769075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16699-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642166983","9783642166990"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16699-0_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}