{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:27:28Z","timestamp":1742995648053,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623790"},{"type":"electronic","value":"9789811623806"}],"license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2380-6_18","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:02:47Z","timestamp":1631782967000},"page":"201-211","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Honeyword Generation Method Using Advanced DNA Algorithm"],"prefix":"10.1007","author":[{"given":"Nwe Ni","family":"Khin","sequence":"first","affiliation":[]},{"given":"Khin Su Myat","family":"Moe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"key":"18_CR1","unstructured":"Marlene, Bachand G (2020) Researchers storing information securely in DNA. 24 August 2020 from http:\/\/phys.org\/news\/2016-17-dna.html"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bonny BR, Vijay JF, Mahalakshmi T (2016) Secure data transfer through DNA cryptography using symmetric algorithm. Int J Comput Appl (0975\u20138887) 133(2)","DOI":"10.5120\/ijca2016907719"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Moe KSM, Win T (2017) Improved hashing and honey-based stronger password prevention against brute force attack. In: 2017 international symposium on electronics and smart devices. IEEE. 978-1-5386-2778-5\/17\/$31.00","DOI":"10.1109\/ISESD.2017.8253295"},{"key":"18_CR4","unstructured":"Noorunnisa NS, Afree KR (2019) Honey encryption based password manager. JETIR 6(5). www.jetir.org (ISSN-2349-5162)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Pushpa BR (2017) A new technique for data encryption using DNA sequence. In: International conference on intelligent computing and control (I2C2)","DOI":"10.1109\/I2C2.2017.8321834"},{"key":"18_CR6","unstructured":"Mavanai S, Pal A, Pandey R, Nadar D (2019) Message transmission using DNA crypto-system. Int J Comput Sci Mobile Comput 8(4):108\u2013114"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Kumar BR, Sri S, Katamaraju GMSA, Rani P, Harinadh N, Saibabu C (2020) File encryption and decryption using DNA technology. In: Second international conference on innovative mechanisms for industry applications (ICIMIA 2020). IEEE. Xplore Part Number: CFP20K58-ART; ISBN: 978-1-7281-4167-1","DOI":"10.1109\/ICIMIA48430.2020.9074970"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Juels A, Revist RL (2013) Honeywords making password cracking detectable. In: MIT CSAIL","DOI":"10.1145\/2508859.2516671"},{"issue":"5","key":"18_CR9","doi-asserted-by":"publisher","first-page":"311","DOI":"10.25046\/aj030537","volume":"3","author":"KSM Moe","year":"2018","unstructured":"Moe KSM, Win T (2018) Protecting private data using improved honey encryption and honeywords generation algorithm. Adv Sci Technol Eng Syst J 3(5):311\u2013320","journal-title":"Adv Sci Technol Eng Syst J"},{"key":"18_CR10","unstructured":"Omer A (2015) DNA cryptography algorithms and applications. Hitec University"},{"key":"18_CR11","unstructured":"Gross D (2013) 50 million compromised in Evernote hack. CNN"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2380-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:21:16Z","timestamp":1631784076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2380-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"ISBN":["9789811623790","9789811623806"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2380-6_18","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}