{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:47:27Z","timestamp":1742960847461,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287619"},{"type":"electronic","value":"9783642287626"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28762-6_15","type":"book-chapter","created":{"date-parts":[[2012,3,8]],"date-time":"2012-03-08T11:50:52Z","timestamp":1331207452000},"page":"121-128","source":"Crossref","is-referenced-by-count":0,"title":["Unconditionally Secure Protocols with Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Ignacio","family":"Hern\u00e1ndez-Ant\u00f3n","sequence":"first","affiliation":[]},{"given":"Fernando","family":"Soler-Toscano","sequence":"additional","affiliation":[]},{"given":"Hans","family":"van Ditmarsch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","first-page":"33","volume":"33","author":"M. Albert","year":"2005","unstructured":"Albert, M., Aldred, R., Atkinson, M., van Ditmarsch, H., Handley, C.: Safe communication for card players by combinatorial designs for two-step protocols. Australasian Journal of Combinatorics\u00a033, 33\u201346 (2005)","journal-title":"Australasian Journal of Combinatorics"},{"key":"15_CR2","series-title":"AISC","first-page":"117","volume-title":"International Symposium on DCAI","author":"M. Albert","year":"2011","unstructured":"Albert, M., Cord\u00f3n-Franco, A., van Ditmarsch, H., Fern\u00e1ndez-Duque, D., Joosten, J.J., Soler-Toscano, F.: Secure Communication of Local States in Interpreted Systems. In: Abraham, A., Corchado, J.M., Gonz\u00e1lez, S.R., De Paz Santana, J.F. (eds.) International Symposium on Distributed Computing and Artificial Intelligence. AISC, vol.\u00a091, pp. 117\u2013124. Springer, Heidelberg (2011)"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1026168632319","volume":"75","author":"H. van Ditmarsch","year":"2003","unstructured":"van Ditmarsch, H.: The Russian cards problem. Studia Logica\u00a075, 31\u201362 (2003)","journal-title":"Studia Logica"},{"key":"15_CR4","series-title":"Synthese Library","volume-title":"Dynamic Epistemic Logic","author":"H. van Ditmarsch","year":"2007","unstructured":"van Ditmarsch, H., van der Hoek, W., Kooi, B.: Dynamic Epistemic Logic. Synthese Library, vol.\u00a0337. Springer, Heidelberg (2007)"},{"key":"15_CR5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning about Knowledge","author":"R. Fagin","year":"1995","unstructured":"Fagin, R., Halpern, J., Moses, Y., Vardi, M.: Reasoning about Knowledge. MIT Press, Cambridge (1995)"},{"issue":"2","key":"15_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s001459900004","volume":"9","author":"M. Fischer","year":"1996","unstructured":"Fischer, M., Wright, R.: Bounds on secret key exchange using a random deal of cards. Journal of Cryptology\u00a09(2), 71\u201399 (1996)","journal-title":"Journal of Cryptology"},{"issue":"6","key":"15_CR7","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1080\/19393550903327558","volume":"18","author":"A. Kumar","year":"2009","unstructured":"Kumar, A., Ghose, M.K.: Overview of information security using genetic algorithm and chaos. Information Security Journal: A Global Perspective\u00a018(6), 306\u2013315 (2009)","journal-title":"Information Security Journal: A Global Perspective"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/1-84628-352-3_15","volume-title":"EC2ND 2005","author":"P. Ocenasek","year":"2006","unstructured":"Ocenasek, P.: Evolutionary approach in the security protocols design. In: Blyth, A. (ed.) EC2ND 2005, pp. 147\u2013156. Springer, London (2006)"},{"key":"15_CR9","unstructured":"Plaza, J.: Logics of public communications. In: Emrich, M., et al. (eds.) Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems, pp. 201\u2013216 (1989)"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00175354","volume":"4","author":"D. Whitley","year":"1994","unstructured":"Whitley, D.: A genetic algorithm tutorial. Statistics and Computing\u00a04, 65\u201385 (1994)","journal-title":"Statistics and Computing"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Zarza, L., Pegueroles, J., Soriano, M.: Evaluation function for synthesizing security protocols by means of genetic algorithms (2007)","DOI":"10.1109\/ARES.2007.83"}],"container-title":["Advances in Intelligent and Soft Computing","Highlights on Practical Applications of Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28762-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T17:59:09Z","timestamp":1742666349000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28762-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287619","9783642287626"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28762-6_15","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]}}}