{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:24:26Z","timestamp":1725805466874},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662450482"},{"type":"electronic","value":"9783662450499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45049-9_13","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T06:07:14Z","timestamp":1411106834000},"page":"78-82","source":"Crossref","is-referenced-by-count":5,"title":["An Encryption Scheme Based on DNA Microdots Technology"],"prefix":"10.1007","author":[{"given":"Guangzhao","family":"Cui","sequence":"first","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zicheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanmin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"13_CR1","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1007\/s11434-006-2012-5","volume":"51","author":"G.Z. Xiao","year":"2006","unstructured":"Xiao, G.Z., Lu, M.X., Qin, L., et al.: New field of cryptography: DNA cryptography. J. Chinese Science Bullentin\u00a051(12), 1413\u20131420 (2006)","journal-title":"J. Chinese Science Bullentin"},{"issue":"3","key":"13_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.4236\/ns.2009.13023","volume":"1","author":"S.H. Jiao","year":"2009","unstructured":"Jiao, S.H., Goutte, R.: Hiding data in DNA of living organisms. J. Natural Science\u00a01(3), 181\u2013184 (2009)","journal-title":"J. Natural Science"},{"issue":"11","key":"13_CR3","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1016\/j.ins.2010.01.030","volume":"180","author":"H.J. Shiu","year":"2010","unstructured":"Shiu, H.J., Ng, K.L., Fang, J.F., et al.: Data hiding methods based upon DNA sequences. J. Information Sciences\u00a0180(11), 2196\u20132208 (2010)","journal-title":"J. Information Sciences"},{"key":"13_CR4","unstructured":"Kartalopoulos, S.V.: DNA-inspired cryptographic method in optical communications, authentication and data mimicking. In: Military Communications Conference, pp. 774\u2013779 (2005)"},{"issue":"1","key":"13_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1089\/cmb.1999.6.53","volume":"6","author":"L.M. Adleman","year":"1999","unstructured":"Adleman, L.M., et al.: On applying molecular computation to the data encryption standard. J. Journal of Computational Biology\u00a06(1), 53\u201363 (1999)","journal-title":"J. Journal of Computational Biology"},{"issue":"2","key":"13_CR6","first-page":"175","volume":"37","author":"M.X. Lu","year":"2007","unstructured":"Lu, M.X., Lai, X.J., et al.: Symmetric encryption method based on DNA technology. J. Science in China (Series E)\u00a037(2), 175\u2013182 (2007)","journal-title":"J. Science in China (Series E)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L.M. Adleman","year":"1994","unstructured":"Adleman, L.M.: Molecular computation of solutions to combinatorial problems. J. Science\u00a0266, 1021\u20131021 (1994)","journal-title":"J. Science"},{"issue":"1","key":"13_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0304-3975(02)00134-2","volume":"287","author":"M. Amos","year":"2002","unstructured":"Amos, M., Rozenberg, G., et al.: Topics in the theory of DNA computing. J. Theoretical Computer Science\u00a0287(1), 3\u201338 (2002)","journal-title":"J. Theoretical Computer Science"},{"issue":"20","key":"13_CR9","first-page":"139","volume":"43","author":"G.Z. Cui","year":"2007","unstructured":"Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Information security technology in DNA computing. J. Computer Engineering and Applications\u00a043(20), 139\u2013142 (2007)","journal-title":"J. Computer Engineering and Applications"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Abbasy, M.R., Shanmugam, B.: Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. In: Proceedings of the 2011 IEEE World Congress on Services, pp. 385\u2013390 (2011)","DOI":"10.1109\/SERVICES.2011.45"},{"issue":"1","key":"13_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0303-2647(00)00083-6","volume":"57","author":"A. Leier","year":"2000","unstructured":"Leier, A., Richter, C., Banzhaf, W., et al.: Cryptography with DNA binary strands. J. Biosystems\u00a057(1), 13\u201322 (2000)","journal-title":"J. Biosystems"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.biosystems.2005.01.004","volume":"81","author":"K. Tanaka","year":"2005","unstructured":"Tanaka, K., Okamoto, A., Saito, I.: Public-key system using DNA as a one-way function for key distribution. J. Biosystems\u00a081, 25\u201329 (2005)","journal-title":"J. Biosystems"},{"issue":"4","key":"13_CR13","first-page":"760","volume":"16","author":"W.C. Chen","year":"2000","unstructured":"Chen, W.C., Chen, Z.H., et al.: Digital coding of the genetic codons and DNA sequences in high dimension space. J. Acta Biophysica Sinica\u00a016(4), 760\u2013768 (2000)","journal-title":"J. Acta Biophysica Sinica"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-24635-0_12","volume":"2950","author":"A. Gehani","year":"2004","unstructured":"Gehani, A., Labean, T., Reif, J.: DNA-based cryptography. J. Aspects of Molecular Computing\u00a02950, 167\u2013188 (2004)","journal-title":"J. Aspects of Molecular Computing"},{"issue":"6736","key":"13_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"C.T. Clelland","year":"1999","unstructured":"Clelland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. J. Nature\u00a0399(6736), 533\u2013534 (1999)","journal-title":"J. Nature"},{"issue":"8","key":"13_CR16","first-page":"104","volume":"45","author":"G.Z. Cui","year":"2009","unstructured":"Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Encryption scheme research based on DNA technology. J. Computer Engineering and Applications\u00a045(8), 104\u2013106 (2009)","journal-title":"J. Computer Engineering and Applications"},{"issue":"2","key":"13_CR17","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1002\/mabi.201200370","volume":"13","author":"G.C. Goff Le","year":"2013","unstructured":"Le Goff, G.C., Blum, L.J., Marquette, C.A.: Shrinking hydrogel-DNA spots generates 3D microdots arrays. J. Macromol Biosci.\u00a013(2), 227\u2013233 (2013)","journal-title":"J. Macromol Biosci."},{"issue":"001","key":"13_CR18","first-page":"83","volume":"29","author":"Y.F. Wang","year":"2014","unstructured":"Wang, Y.F., Han, Q.Q., Han, D., et al.: Information security technology based on nucleic acids. J. Chinese Academy of Sciences\u00a029(001), 83\u201393 (2014)","journal-title":"J. Chinese Academy of Sciences"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1002\/asi.21658","volume":"63","author":"T. Haigh","year":"2012","unstructured":"Haigh, T.: Emanuel Goldberg and his knowledge machine. J. Am. Soc. Inf. Sci.\u00a063, 427\u2013428 (2012)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"13_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/9781420057133","volume-title":"Cryptography: theory and practice","author":"D.R. Stinson","year":"2005","unstructured":"Stinson, D.R.: Cryptography: theory and practice. CRC Press, Boca Raton (2005)"},{"key":"13_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential cryptanalysis of the data encryption standard","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of the data encryption standard. Springer, New York (1993)"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing - Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45049-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,17]],"date-time":"2022-04-17T07:28:17Z","timestamp":1650180497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45049-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662450482","9783662450499"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45049-9_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}