{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T06:39:26Z","timestamp":1718606366614},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T00:00:00Z","timestamp":1549411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11277-019-06132-4","type":"journal-article","created":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T20:56:40Z","timestamp":1549486600000},"page":"993-1007","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks"],"prefix":"10.1007","volume":"105","author":[{"given":"Priya","family":"Sethuraman","sequence":"first","affiliation":[]},{"given":"P. S.","family":"Tamizharasan","sequence":"additional","affiliation":[]},{"given":"Kannan","family":"Arputharaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"6132_CR1","first-page":"45","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic","author":"A Bogdanov","year":"2012","unstructured":"Bogdanov, A., Knudsen, L. R., Leander, G., Standaert, F. X., Steinberger, J., & Tischhauser, E. (2012). Key-alternating ciphers in a provable setting: Encryption using a small number of public permutations. In D. Pointcheval & T. Johansson (Eds.), Annual international conference on the theory and applications of cryptographic techniques  (Vol. 7237, pp. 45\u201362). Berlin, Heidelberg: Springer."},{"issue":"2\u20133","key":"6132_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s10623-015-0079-1","volume":"77","author":"B Libert","year":"2015","unstructured":"Libert, B., Peters, T., Joye, M., & Yung, M. (2015). Linearly homomorphic structure-preserving signatures and their applications. Designs, Codes and Cryptography, 77(2\u20133), 441\u2013477.","journal-title":"Designs, Codes and Cryptography"},{"key":"6132_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27473-2","volume-title":"Computing with words: Principal concepts and ideas","author":"LA Zadeh","year":"2012","unstructured":"Zadeh, L. A. (2012). Computing with words: Principal concepts and ideas (Vol. 277). Berlin: Springer."},{"key":"6132_CR4","unstructured":"Lin, F.-T., & Kao, C.-Y. (1995). A genetic algorithm for ciphertext-only attack in cryptanalysis. In Systems, man and cybernetics, 1995. Intelligent systems for the 21st century, IEEE international conference on (Vol. 1, pp. 650\u2013654). IEEE."},{"key":"6132_CR5","first-page":"27","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"J-C Faug\u00e8re","year":"2012","unstructured":"Faug\u00e8re, J.-C., Perret, L., Petit, C., & Renault, G. (2012). Improving the complexity of index calculus algorithms in elliptic curves over binary fields. In D. Pointcheval & T. Johansson (Eds.), Annual international conference on the theory and applications of cryptographic techniques  (Vol. 7237, pp. 27\u201344). Berlin, Heidelberg: Springer."},{"issue":"2","key":"6132_CR6","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"issue":"12","key":"6132_CR7","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993\u2013999.","journal-title":"Communications of the ACM"},{"issue":"5","key":"6132_CR8","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.parco.2003.12.014","volume":"30","author":"F Seredynski","year":"2004","unstructured":"Seredynski, F., Bouvry, P., & Zomaya, A. Y. (2004). Cellular automata computations and secret key cryptography. Parallel Computing, 30(5), 753\u2013766.","journal-title":"Parallel Computing"},{"issue":"2","key":"6132_CR9","first-page":"197","volume":"2","author":"H Bhasin","year":"2012","unstructured":"Bhasin, H. (2012). Corpuscular random number generator. International Journal of Information and Electronics Engineering, 2(2), 197.","journal-title":"International Journal of Information and Electronics Engineering"},{"issue":"3","key":"6132_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1080\/07408179908969830","volume":"31","author":"L Burke","year":"1999","unstructured":"Burke, L. (1999). A review of optimization in operations research Ronald L. Rardin Prentice-Hall, 1998, 919pp, ISBN 0-02-398415-5. Iie Transactions, 31(3), 279\u2013280.","journal-title":"Iie Transactions"},{"key":"6132_CR11","unstructured":"Goldberg, D. (1989). Genetic algorithms in search. Optimization, and Machine Learning."},{"issue":"3","key":"6132_CR12","doi-asserted-by":"publisher","first-page":"036121","DOI":"10.1103\/PhysRevE.73.036121","volume":"73","author":"A Ruttor","year":"2006","unstructured":"Ruttor, A., Kinzel, W., Naeh, R., & Kanter, I. (2006). Genetic attack on neural cryptography. Physical Review E, 73(3), 036121.","journal-title":"Physical Review E"},{"issue":"3","key":"6132_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.7815\/ijorcs.23.2012.022","volume":"2","author":"FU Khan","year":"2012","unstructured":"Khan, F. U., & Bhatia, S. (2012). A novel approach to genetic algorithm based cryptography. International Journal of Research in Computer Science, 2(3), 7.","journal-title":"International Journal of Research in Computer Science"},{"key":"6132_CR14","volume-title":"Genetic algorithms in search, optimization and machine learning","author":"JH Holland","year":"1989","unstructured":"Holland, J. H., & Goldberg, D. (1989). Genetic algorithms in search, optimization and machine learning. Reading, MA: Addison-Wesley."},{"key":"6132_CR15","doi-asserted-by":"crossref","unstructured":"Stein, G., Chen, B., Wu, A. S., & Hua, K. A. (2005). Decision tree classifier for network intrusion detection with GA-based feature selection. In Proceedings of the 43rd annual Southeast regional conference (Vol. 2, pp. 136\u2013141). ACM.","DOI":"10.1145\/1167253.1167288"},{"key":"6132_CR16","unstructured":"Kaya, Y., Uyar, M., et\u00a0al. (2011). A novel crossover operator for genetic algorithms: Ring crossover. arXiv preprint \n                    arXiv:1105.0355\n                    \n                  ."},{"key":"6132_CR17","first-page":"1064","volume":"9","author":"S Picek","year":"2010","unstructured":"Picek, S., & Golub, M. (2010). Comparison of a crossover operator in binary-coded genetic algorithms. WSEAS Transactions on Computers, 9, 1064\u20131073.","journal-title":"WSEAS Transactions on Computers"},{"issue":"20","key":"6132_CR18","doi-asserted-by":"publisher","first-page":"10","DOI":"10.5120\/20860-3559","volume":"118","author":"R Jhingran","year":"2015","unstructured":"Jhingran, R., Thada, V., & Dhaka, S. (2015). A study on cryptography using genetic algorithm. International Journal of Computer Applications, 118(20), 10\u201314.","journal-title":"International Journal of Computer Applications"},{"issue":"5\u20136","key":"6132_CR19","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1080\/09720529.2014.952521","volume":"17","author":"Z Ma","year":"2014","unstructured":"Ma, Z., & Zeng, S. (2014). Confidence intuitionistic fuzzy hybrid weighted operator and its application in multi-criteria decision making. Journal of Discrete Mathematical Sciences and Cryptography, 17(5\u20136), 529\u2013538.","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"key":"6132_CR20","volume-title":"Fuzzy set theory and its applications","author":"H-J Zimmermann","year":"2011","unstructured":"Zimmermann, H.-J. (2011). Fuzzy set theory and its applications. Berlin: Springer."},{"issue":"2","key":"6132_CR21","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s12046-014-0236-7","volume":"39","author":"Sethukkarasi Ganapathy","year":"2014","unstructured":"Ganapathy, Sethukkarasi, Sethukkarasi, R., Yogesh, P., Vijayakumar, P., & Kannan, A. (2014). An intelligent temporal pattern classification system using fuzzy temporal rules and particle swarm optimization. Sadhana, 39(2), 283\u2013302.","journal-title":"Sadhana"},{"key":"6132_CR22","doi-asserted-by":"crossref","unstructured":"Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H.\u00a0K., & Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (p. 117). ACM.","DOI":"10.1145\/2980258.2982109"},{"key":"6132_CR23","doi-asserted-by":"crossref","unstructured":"Selvi, M., Logambigai, R., Ganapathy, S., Nehemiah, H. K., & Arputharaj, K. (2017). An intelligent agent and FSO based efficient routing algorithm for wireless sensor network. In Recent trends and challenges in computational models (ICRTCCM), 2017 second international conference on (pp. 100\u2013105). IEEE.","DOI":"10.1109\/ICRTCCM.2017.43"},{"key":"6132_CR24","doi-asserted-by":"publisher","first-page":"1750","DOI":"10.1016\/j.proeng.2012.06.213","volume":"38","author":"S Ganapathy","year":"2012","unstructured":"Ganapathy, S., Kulothungan, K., Yogesh, P., & Kannan, A. (2012). A novel weighted fuzzy C-means clustering based on immune genetic algorithm for intrusion detection. Procedia Engineering, 38, 1750\u20131757.","journal-title":"Procedia Engineering"},{"issue":"1","key":"6132_CR25","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/0005-1098(77)90008-5","volume":"13","author":"SM Baas","year":"1977","unstructured":"Baas, S. M., & Kwakernaak, H. (1977). Rating and ranking of multiple-aspect alternatives using fuzzy sets. Automatica, 13(1), 47\u201358.","journal-title":"Automatica"},{"key":"6132_CR26","first-page":"1","volume-title":"Computational intelligence: Soft computing and fuzzy-neuro integration with applications","author":"LA Zadeh","year":"1998","unstructured":"Zadeh, L. A. (1998). Roles of soft computing and fuzzy logic in the conception, design and deployment of information\/intelligent systems. In O. Kaynak, L. A. Zadeh, B. T\u00fcrk\u015fen & I. J. Rudas (Eds.), Computational intelligence: Soft computing and fuzzy-neuro integration with applications (pp. 1\u20139). Berlin, Heidelberg: Springer"},{"key":"6132_CR27","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.compeleceng.2018.03.036","volume":"68","author":"R Logambigai","year":"2018","unstructured":"Logambigai, R., Ganapathy, S., & Kannan, A. (2018). Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62\u201375.","journal-title":"Computers & Electrical Engineering"},{"key":"6132_CR28","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.procs.2016.05.221","volume":"85","author":"Z Mihret","year":"2016","unstructured":"Mihret, Z., & Ahmad, M. W. (2016). The reverse engineering of reverse encryption algorithm and a systematic comparison to DES. Procedia Computer Science, 85, 558\u2013570.","journal-title":"Procedia Computer Science"},{"key":"6132_CR29","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.procs.2017.10.079","volume":"116","author":"R Riyaldhi","year":"2017","unstructured":"Riyaldhi, R., Kurniawan, A., et al. (2017). Improvement of advanced encryption standard algorithm with shift row and S. box modification mapping in mix column. Procedia Computer Science, 116, 401\u2013407.","journal-title":"Procedia Computer Science"},{"key":"6132_CR30","doi-asserted-by":"publisher","first-page":"26059","DOI":"10.1109\/ACCESS.2018.2832854","volume":"6","author":"H Tang","year":"2018","unstructured":"Tang, H., Sun, Q. T., Yang, X., & Long, K. (2018). A network coding and DES based dynamic encryption scheme for moving target defense. IEEE Access, 6, 26059\u201326068.","journal-title":"IEEE Access"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06132-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06132-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06132-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T00:19:25Z","timestamp":1580948365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06132-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,6]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6132"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06132-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,6]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}