{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:11Z","timestamp":1759132031389},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642355202"},{"type":"electronic","value":"9783642355219"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35521-9_54","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T15:21:32Z","timestamp":1353943292000},"page":"369-373","source":"Crossref","is-referenced-by-count":18,"title":["Secure Information Sharing Using Personal Biometric Characteristics"],"prefix":"10.1007","author":[{"given":"Marek R.","family":"Ogiela","sequence":"first","affiliation":[]},{"given":"Urszula","family":"Ogiela","sequence":"additional","affiliation":[]},{"given":"Lidia","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"54_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1089\/cmb.1999.6.53","volume":"6","author":"L.M. Adleman","year":"1999","unstructured":"Adleman, L.M., Rothemund, P.W.K., Roweiss, S., et al.: On applying molecular computation to the Data Encryption Standard. Journal of Computational Biology\u00a06(1), 53\u201363 (1999)","journal-title":"Journal of Computational Biology"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of the National Computer Conference, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"54_CR3","doi-asserted-by":"crossref","unstructured":"Chomsky, N.: Syntactic Structures, London Mouton (1957)","DOI":"10.1515\/9783112316009"},{"key":"54_CR4","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"2001","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)"},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"Ogiela L.: Semantic Analysis and Biological Modelling in Cognitive Categorization Systems. Mathematical and Computer Modelling (in press, 2013)","DOI":"10.1016\/j.mcm.2012.12.001"},{"key":"54_CR6","series-title":"SCI","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02693-5","volume-title":"Cognitive Techniques in Visual Data Interpretation","author":"L. Ogiela","year":"2009","unstructured":"Ogiela, L., Ogiela, M.R.: Cognitive Techniques in Visual Data Interpretation. SCI, vol.\u00a0228. Springer, Heidelberg (2009)"},{"key":"54_CR7","series-title":"COSMOS","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25246-4","volume-title":"Advences in Cognitive Information Systems","author":"L. Ogiela","year":"2012","unstructured":"Ogiela, L., Ogiela, M.R.: Advences in Cognitive Information Systems. COSMOS, vol.\u00a017. Springer, Heidelberg (2012)"},{"key":"54_CR8","series-title":"SCI","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-02937-0_2","volume-title":"New Directions in Intelligent Interactive Multimedia Systems and Services - 2","author":"M.R. Ogiela","year":"2009","unstructured":"Ogiela, M.R., Ogiela, U.: Security of Linguistic Threshold Schemes in Multimedia Systems. In: Damiani, E., Jeong, J., Howlett, R.J., Jain, L.C. (eds.) New Directions in Intelligent Interactive Multimedia Systems and Services - 2. SCI, vol.\u00a0226, pp. 13\u201320. Springer, Heidelberg (2009)"},{"key":"54_CR9","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-10847-1_5","volume-title":"Security Technology","author":"M.R. Ogiela","year":"2009","unstructured":"Ogiela, M.R., Ogiela, U.: Shadow Generation Protocol in Linguistic Threshold Schemes. In: \u015al\u0119zak, D., Kim, T.-h., Fang, W.-C., Arnett, K.P. (eds.) SecTech 2009. CCIS, vol.\u00a058, pp. 35\u201342. Springer, Heidelberg (2009)"},{"issue":"2","key":"54_CR10","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.camwa.2010.02.028","volume":"60","author":"M.R. Ogiela","year":"2010","unstructured":"Ogiela, M.R., Ogiela, U.: The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers and Mathematics with Applications\u00a060(2), 267\u2013271 (2010)","journal-title":"Computers and Mathematics with Applications"},{"key":"54_CR11","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.ijinfomgt.2011.11.016","volume":"32","author":"M.R. Ogiela","year":"2012","unstructured":"Ogiela, M.R., Ogiela, U.: DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management\u00a032, 175\u2013181 (2012)","journal-title":"International Journal of Information Management"},{"issue":"2","key":"54_CR12","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1016\/j.camwa.2011.10.038","volume":"63","author":"M.R. Ogiela","year":"2012","unstructured":"Ogiela, M.R., Ogiela, U.: Linguistic Protocols for Secure Information Management and Sharing. Computers and Mathematics with Applications\u00a063(2), 564\u2013572 (2012)","journal-title":"Computers and Mathematics with Applications"},{"key":"54_CR13","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM, 612\u2013613 (1979)","DOI":"10.1145\/359168.359176"},{"key":"54_CR14","first-page":"259","volume":"1","author":"S. Tang","year":"2004","unstructured":"Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science\u00a01, 259\u2013262 (2004)","journal-title":"Journal of Information and Computational Science"}],"container-title":["Communications in Computer and Information Science","Computer Applications for Bio-technology, Multimedia, and Ubiquitous City"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35521-9_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T23:42:36Z","timestamp":1594942956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35521-9_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642355202","9783642355219"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35521-9_54","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}