{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:19:39Z","timestamp":1744147179046},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_41","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T08:08:15Z","timestamp":1347264495000},"page":"422-431","source":"Crossref","is-referenced-by-count":10,"title":["Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation"],"prefix":"10.1007","author":[{"given":"S.","family":"Santhanalakshmi","sequence":"first","affiliation":[]},{"given":"T. S. B.","family":"Sudarshan","sequence":"additional","affiliation":[]},{"given":"Gopal K.","family":"Patra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","unstructured":"Kinzel, W., Kanter, I.: Neural Cryptography. cond mat\/0208453 (2002)"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Rosen-Zvi, M., Kanter, I., Kinzel, W.: Cryptography based on Neural Networks: Analytical Results, cond- mat\/0202350 (2002)","DOI":"10.1088\/0305-4470\/35\/47\/104"},{"key":"41_CR3","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1209\/epl\/i2002-00552-9","volume":"57","author":"I. Kanter","year":"2002","unstructured":"Kanter, I., Kinzel, W., Kanter, E.: Secure Exchange of Information by Synchronization of Neural Networks. Europhys. Letter\u00a057, 141\u2013147 (2002)","journal-title":"Europhys. Letter"},{"key":"41_CR4","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley"},{"key":"41_CR5","volume-title":"Computational Intelligence. Principles, Techniques and Applications","author":"A. Konar","year":"2005","unstructured":"Konar, A.: Computational Intelligence. Principles, Techniques and Applications. Springer, Heidelberg (2005)"},{"key":"41_CR6","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A Statistical test suite for random and pseudorandom number generators for Cryptographic Applications"},{"key":"41_CR7","first-page":"689","volume-title":"Advances in Neural Information Processing Systems","author":"E. Klein","year":"2005","unstructured":"Klein, E., Mislovathy, R., Kanter, I., Ruttor, A., Kinzel, W.: Synchronization of Neural Networks by Mutual Learning and its Application to Cryptography. In: Advances in Neural Information Processing Systems, vol.\u00a017, pp. 689\u2013696. MIT Press, Cambridge (2005)"},{"key":"41_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-36178-2_18","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"A. Klimov","year":"2002","unstructured":"Klimov, A., Mityagin, A., Shamir, A.: Analysis of Neural Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 288\u2013298. Springer, Heidelberg (2002)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:45:56Z","timestamp":1620117956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}