{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:49:59Z","timestamp":1742982599429,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642166983"},{"type":"electronic","value":"9783642166990"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16699-0_5","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:55:31Z","timestamp":1288691731000},"page":"34-42","source":"Crossref","is-referenced-by-count":1,"title":["Secure Medical Diagnosis Using Rule Based Mining"],"prefix":"10.1007","author":[{"given":"M. A.","family":"Saleem Durai","sequence":"first","affiliation":[]},{"given":"N. Ch.","family":"Sriman Narayana Iyengar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Discovering human understandable fuzzy diagnostic rules from medical data Giovanna Castellano, Anna Maria Fanelli and Corrado Mencar Department of Computer Science University of Bari"},{"issue":"6","key":"5_CR2","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1055\/s-2006-927117","volume":"27","author":"A. Saftoiu","year":"2006","unstructured":"Saftoiu, A., Vilmann, P., Hassan, H., Gorunescu, F.: Analysis of endoscopic ultrasound elastography used for characterization and differentiation of benign and malignant lymph nodes. Ultraschall in der Medizin (European Journal of Ultrasound)\u00a027(6), 535\u2013542 (2006)","journal-title":"Ultraschall in der Medizin (European Journal of Ultrasound)"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.artmed.2004.02.007","volume":"32","author":"A. Tsakonas","year":"2004","unstructured":"Tsakonas, A., Dounias, G., Jantzen, J., Axer, H.: Evolving rule based systems in two medical domains using genetic programming. Artificial Intelligence of Medicine- Elsevier Journal\u00a032, 195\u2013216 (2004)","journal-title":"Artificial Intelligence of Medicine- Elsevier Journal"},{"key":"5_CR4","unstructured":"Alsultanny, Y.A.: Image encryption by Cipher Feedback Mode, Computer Engineering Department Applied Science University, Amman 11931, Jordan. International Journal of Innovative Computing, Information and Control\u00a03(3) (June 2007)"},{"issue":"6","key":"5_CR5","first-page":"1317","volume":"2","author":"W.M. Zheng","year":"2006","unstructured":"Zheng, W.M., Lu, Z.M., Burkhardt, H.: Color image retrieval schemes using index histograms based on various spatial-domain vector quantizers. International Journal of Innovative, Computing, Information & Control\u00a02(6), 1317\u20131327 (2006)","journal-title":"International Journal of Innovative, Computing, Information & Control"},{"key":"5_CR6","volume-title":"Digital Image Processing","author":"R.C. Gonzalez","year":"2002","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing. Prentice-Hall, Inc., Englewood Cliffs (2002)"},{"key":"5_CR7","unstructured":"Yahya, A.A., Abdalla, A.M.: A Shuffle Image-Encryption Algorithm Department of Computer Science, Al-Zaytoonah University of Jordan, Amman 11733, Jordan"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"265","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review\u00a0265, 5 (1996)","journal-title":"Computer Communication Review"},{"key":"5_CR9","unstructured":"Srikanth, V., Vishwanathan, C., Asati, U., Sriman Narayana Iyengar, N.C.: THINK (Testifying Human Based On Intelligence and Knowledge). In: Proceedings of ICAC 2009, Mumbai, Maharashtra, India, January 23-24 (2009) Copyright 2009 ACM 978-1-60558-351-8"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"115","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, M.A., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications\u00a0115, 648\u2013656 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["Communications in Computer and Information Science","Advances in Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16699-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T19:26:15Z","timestamp":1553196375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16699-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642166983","9783642166990"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16699-0_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}