{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:21:36Z","timestamp":1743074496194,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811310553"},{"type":"electronic","value":"9789811310560"}],"license":[{"start":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T00:00:00Z","timestamp":1532390400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1056-0_6","type":"book-chapter","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T12:30:31Z","timestamp":1532349031000},"page":"53-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Applying Triple Data Encryption Algorithm to a Chaotic Systems: T-S Fuzzy Model-Based Approach"],"prefix":"10.1007","author":[{"given":"Feng-Hsiag","family":"Hsiao","sequence":"first","affiliation":[]},{"given":"Po-Han","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,24]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.fss.2011.03.014","volume":"174","author":"C Hu","year":"2011","unstructured":"Hu C, Jiang H, Teng Z (2011) General impulsive control of chaotic systems based on a TS fuzzy model. Fuzzy Sets Syst 174:66\u201382","journal-title":"Fuzzy Sets Syst"},{"issue":"6","key":"6_CR2","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1109\/81.678489","volume":"45","author":"G. Poddar","year":"1998","unstructured":"Poddar G, Chakrabarty K, Banerjee S (1998) Control of\u00a0chaos\u00a0in DC-DC converters. IEEE Trans. Circuit Syst I 45:672\u2013676","journal-title":"IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"3234","DOI":"10.1016\/j.chaos.2009.04.054","volume":"42","author":"SL Lin","year":"2009","unstructured":"Lin SL, Tung PC (2009) A new method for chaos control in communication systems. Chaos, Solitons Fractals 42:3234\u20133241","journal-title":"Chaos, Solitons Fractals"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"LM Pecora","year":"1990","unstructured":"Pecora LM, Carroll TL (1990) Synchronization in chaotic systems. Phys Rev Lett 64:821\u2013824","journal-title":"Phys Rev Lett"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TFUZZ.2013.2291568","volume":"22","author":"A Mohammadzadeh","year":"2014","unstructured":"Mohammadzadeh A, Kaynak O, Teshnehlab M (2014) Two-mode indirect adaptive control approach for the synchronization of uncertain chaotic systems by the use of a hierarchical interval type-2 fuzzy neural network. IEEE Trans Fuzzy Syst 22:1301\u20131312","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TFUZZ.2011.2127482","volume":"19","author":"TC Lin","year":"2011","unstructured":"Lin TC, Lee TY (2011) Chaos synchronization of uncertain fractional-order chaotic systems with time delay based on adaptive fuzzy sliding mode control. IEEE Trans Fuzzy Syst 19:623\u2013635","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"9428","DOI":"10.1109\/ACCESS.2017.2647920","volume":"4","author":"R Jafari","year":"2016","unstructured":"Jafari R, Yu W, Li X (2016) Fuzzy differential equations for nonlinear system modeling with bernstein neural networks. IEEE Access 4:9428\u20139436","journal-title":"IEEE Access"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Wang W, Gelder PHAJMV, Vrijling JK (2008) The effects of dynamical noises on the identification of chaotic systems: with application to streamflow processes. In: Fourth International Conference on Natural Computation, Jinan, 2008, pp 685\u2013691","DOI":"10.1109\/ICNC.2008.886"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.physleta.2006.09.068","volume":"361","author":"S Li","year":"2007","unstructured":"Li S, Xu W, Li R (2007) Synchronization of two different chaotic systems with unknown parameters. Phys Lett A 361:98\u2013102","journal-title":"Phys Lett A"},{"key":"6_CR10","unstructured":"Parlitz U, Kocarev L, Schuster HG (1999) Handbook of chaos control. Wiley\u2013VCH"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1147\/rd.402.0253","volume":"40","author":"D Coppersmith","year":"1996","unstructured":"Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-DES encryption. IBM J Res Dev 40:253\u2013262","journal-title":"IBM J Res Dev"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"6260","DOI":"10.1109\/TIT.2016.2611003","volume":"62","author":"CJ Mitchell","year":"2016","unstructured":"Mitchell CJ (2016) On the security of 2-key triple DES. IEEE Trans Inf Theory 62:6260\u20136267","journal-title":"IEEE Trans Inf Theory"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Jun Y, Na L, Jun D (2009) A design and implementation of high-speed 3DES algorithm system. In: Second international conference on future information technology and management engineering, Sanya 2009, pp 175\u2013178","DOI":"10.1109\/FITME.2009.49"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/TST.2016.7442503","volume":"21","author":"Yanting Ren","year":"2016","unstructured":"Ren Y et al (2016) Key recovery against 3DES in CPU smart card based on improved correlation power analysis. Tsinghua Sci Technol 21:210\u2013220","journal-title":"Tsinghua Science and Technology"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/3-540-48519-8_16","volume-title":"Fast Software Encryption","author":"Helena Handschuh","year":"1999","unstructured":"Handschuh H, Prenee B (1999) On the security of double and 2-key triple modes of operation. In: Fast software encryption, vol. 1636 of lecture notes in computer science, pp 215\u2013230"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"SMC-15","author":"Tomohiro Takagi","year":"1985","unstructured":"Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 15:116\u2013132","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TIM.2010.2086850","volume":"60","author":"ST Pan","year":"2011","unstructured":"Pan ST (2011) Evolutionary computation on programmable robust IIR filter pole-placement design. IEEE Trans Instrum Meas 60:1469\u20131479","journal-title":"IEEE Trans Instrum Meas"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1049\/ip-d.1992.0011","volume":"139","author":"WJ Wang","year":"1992","unstructured":"Wang WJ, Cheng CF (1992) Stabilising controller and observer synthesis for uncertain large-scale systems by the Riccati equation approach. IEE Proc D 139:72\u201378","journal-title":"IEE Proc D"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1016\/j.chaos.2007.07.005","volume":"39","author":"YJ Sun","year":"2009","unstructured":"Sun YJ (2009) Exponential synchronization between two classes of chaotic systems. Chaos, Solitons Fractals 39:2363\u20132368","journal-title":"Chaos, Solitons Fractals"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"1422","DOI":"10.1109\/72.728392","volume":"9","author":"S Limanond","year":"1998","unstructured":"Limanond S, Si J (1998) Neural-network-based control design: an LMI approach. IEEE Trans Neural Netw 9:1422\u20131429","journal-title":"IEEE Trans Neural Netw"},{"key":"6_CR21","unstructured":"Gahinet P, Nemirovski A, Laub AJ, Chilali M (1995) LMI control toolbox user\u2019s guide. The MathWorks, Inc"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2018"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1056-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T22:34:13Z","timestamp":1558132453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1056-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,24]]},"ISBN":["9789811310553","9789811310560"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1056-0_6","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2018,7,24]]},"assertion":[{"value":"24 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Science and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}