{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:11:57Z","timestamp":1771855917624,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Membr Comput"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s41965-022-00110-9","type":"journal-article","created":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T16:02:40Z","timestamp":1671724960000},"page":"341-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A key agreement protocol based on spiking neural P systems with anti-spikes"],"prefix":"10.1007","volume":"4","author":[{"given":"Mihail-Iulian","family":"Plesa","sequence":"first","affiliation":[]},{"given":"Marian","family":"Gheoghe","sequence":"additional","affiliation":[]},{"given":"Florentin","family":"Ipate","sequence":"additional","affiliation":[]},{"given":"Gexiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,22]]},"reference":[{"issue":"4","key":"110_CR1","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/s41965-020-00059-7","volume":"2","author":"HN Adorna","year":"2020","unstructured":"Adorna, H. N. (2020). Computing with SN P systems with I\/O mode. Journal of Membrane Computing, 2(4), 230\u2013245.","journal-title":"Journal of Membrane Computing"},{"issue":"1","key":"110_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41965-020-00068-6","volume":"3","author":"A Alhazov","year":"2021","unstructured":"Alhazov, A., Freund, R., & Ivanov, S. (2021). P systems with limited number of objects. Journal of Membrane Computing, 3(1), 1\u20139.","journal-title":"Journal of Membrane Computing"},{"key":"110_CR3","first-page":"215","volume-title":"Applications of Membrane Computing","author":"A Alhazov","year":"2006","unstructured":"Alhazov, A., & Sburlan, D. (2006). Static sorting P systems. Applications of Membrane Computing (pp. 215\u2013252). Springer."},{"key":"110_CR4","doi-asserted-by":"crossref","unstructured":"Allam, A.M., Abbas, H.M. (2009). Improved security of neural cryptography using don\u2019t-trust-my-partner and error prediction. In: 2009 International Joint Conference on Neural Networks. IEEE, 121\u2013127.","DOI":"10.1109\/IJCNN.2009.5178851"},{"issue":"12","key":"110_CR5","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/TNN.2010.2079948","volume":"21","author":"AM Allam","year":"2010","unstructured":"Allam, A. M., & Abbas, H. M. (2010). On the improvement of neural cryptography using erroneous transmitted information with error prediction. IEEE transactions on neural networks, 21(12), 1915\u20131924.","journal-title":"IEEE transactions on neural networks"},{"issue":"4","key":"110_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s41965-020-00060-0","volume":"2","author":"T Bao","year":"2020","unstructured":"Bao, T., Zhou, N., Lv, Z., Peng, H., & Wang, J. (2020). Sequential dynamic threshold neural P systems. Journal of Membrane Computing, 2(4), 255\u2013268.","journal-title":"Journal of Membrane Computing"},{"key":"110_CR7","unstructured":"Carandang, J.P., Villaflores, J.M.B., Cabarle, F.G.C., Adorna, H.N., Mart\u00ednez\u00a0del Amor, M.\u00c1. (2016). CuSNP: Spiking Neural P Systems Simulators in CUDA. In: ACMC 2016: The 5th Asian Conference on Membrane Computing, IMCS: International Membrane Computing Society, 451-468."},{"issue":"24\u201325","key":"110_CR8","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1016\/j.tcs.2009.02.031","volume":"410","author":"M Cavaliere","year":"2009","unstructured":"Cavaliere, M., Ibarra, O. H., P\u0103un, G., Egecioglu, O., Ionescu, M., & Woodworth, S. (2009). Asynchronous spiking neural P systems. Theoretical Computer Science, 410(24\u201325), 2352\u20132364.","journal-title":"Theoretical Computer Science"},{"key":"110_CR9","unstructured":"Chen, Y., Chen, Y., Zhang, G., Paul, P., Wu, T., Zhang, X., Rong, H., Ma, X. (2021). A survey of learning Spiking Neural P systems and A Novel Instance. International Journal of Unconventional Computing, 16."},{"issue":"1","key":"110_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s41965-018-00002-x","volume":"1","author":"D D\u00edaz-Pernil","year":"2019","unstructured":"D\u00edaz-Pernil, D., Guti\u00e9rrez-Naranjo, M. A., & Peng, H. (2019). Membrane computing and image processing: a short survey. Journal of Membrane Computing, 1(1), 58\u201373.","journal-title":"Journal of Membrane Computing"},{"issue":"11","key":"110_CR11","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2019","unstructured":"Dong, T., & Huang, T. (2019). Neural cryptography based on complex-valued neural network. IEEE Transactions on Neural Networks and Learning Systems, 31(11), 4999\u20135004.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"1","key":"110_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s41965-022-00092-8","volume":"4","author":"AGS Dupaya","year":"2022","unstructured":"Dupaya, A. G. S., Galano, A. C. A. P., Cabarle, F. G. C., De La Cruz, R. T., Ballesteros, K. J., & Lazo, P. P. L. (2022). A web-based visual simulator for spiking neural P systems. Journal of Membrane Computing, 4(1), 21\u201340.","journal-title":"Journal of Membrane Computing"},{"issue":"1","key":"110_CR13","doi-asserted-by":"publisher","first-page":"72","DOI":"10.3390\/pr9010072","volume":"9","author":"ADC Fernandez","year":"2020","unstructured":"Fernandez, A. D. C., Fresco, R. M., Cabarle, F. G. C., de la Cruz, R. T. A., Macababayao, I. C. H., Ballesteros, K. J., & Adorna, H. N. (2020). Snapse: A visual tool for spiking neural P systems. Processes, 9(1), 72.","journal-title":"Processes"},{"issue":"1","key":"110_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s41965-021-00073-3","volume":"3","author":"G Ganbaatar","year":"2021","unstructured":"Ganbaatar, G., Nyamdorj, D., Cichon, G., & Ishdorj, T. O. (2021). Implementation of RSA cryptographic algorithm using SN P systems based on HP\/LP neurons. Journal of Membrane Computing, 3(1), 22\u201334.","journal-title":"Journal of Membrane Computing"},{"key":"110_CR15","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Quismondo, M., Guti\u00e9rrez-Escudero, R., P\u00e9rez-Hurtado, I., P\u00e9rez-Jim\u00e9nez, M.J., Riscos-N\u00fa\u00f1ez, A. (2009). An overview of P-Lingua 2.0. In: International Workshop on Membrane Computing, Springer, 264\u2013288.","DOI":"10.1007\/978-3-642-11467-0_20"},{"issue":"2","key":"110_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s41965-021-00075-1","volume":"3","author":"M Gheorghe","year":"2021","unstructured":"Gheorghe, M., Lefticaru, R., Konur, S., Niculescu, I. M., & Adorna, H. N. (2021). Spiking neural P systems: matrix representation and formal verification. Journal of Membrane Computing, 3(2), 133\u2013148.","journal-title":"Journal of Membrane Computing"},{"issue":"2","key":"110_CR17","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s41965-020-00041-3","volume":"2","author":"T Hinze","year":"2020","unstructured":"Hinze, T., Happe, H., Henderson, A., & Nicolescu, R. (2020). Membrane computing with water. Journal of Membrane Computing, 2(2), 121\u2013136.","journal-title":"Journal of Membrane Computing"},{"key":"110_CR18","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H., Silverman, J.H. (2008). An introduction to mathematical cryptography, vol.\u00a01. Springer."},{"key":"110_CR19","unstructured":"Ionescu, M., P\u0103un, G., Yokomori, T. (2006). Spiking neural P systems. Fundamenta Informaticae, 71(2\u20133), 279\u2013308."},{"key":"110_CR20","doi-asserted-by":"crossref","unstructured":"Ipate, F., Lefticaru, R., Mierl\u0103, L., Cabrera, L.V., Han, H., Zhang, G., Dragomir, C., Jim\u00e9nez, M.J.P., Gheorghe, M. (2013). Kernel P systems: Applications and implementations. In: Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), Springer, 1081\u20131089.","DOI":"10.1007\/978-3-642-37502-6_126"},{"key":"110_CR21","doi-asserted-by":"crossref","unstructured":"Javurek, M., Tur\u010dan\u00edk, M. (2016). Synchronization of two tree parity machines. In: 2016 New Trends in Signal Processing (NTSP). IEEE, 1\u20134.","DOI":"10.1109\/NTSP.2016.7747782"},{"key":"110_CR22","doi-asserted-by":"crossref","unstructured":"Jeong, S., Park, C., Hong, D., Seo, C., Jho, N. (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Security and Communication Networks.","DOI":"10.1155\/2021\/6680782"},{"issue":"1","key":"110_CR23","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1209\/epl\/i2002-00552-9","volume":"57","author":"I Kanter","year":"2002","unstructured":"Kanter, I., Kinzel, W., & Kanter, E. (2002). Secure exchange of information by synchronization of neural networks. EPL (Europhysics Letters), 57(1), 141.","journal-title":"EPL (Europhysics Letters)"},{"key":"110_CR24","unstructured":"Klein, E., Mislovaty, R., Kanter, I., Ruttor, A., Kinzel, W. (2004). Synchronization of neural networks by mutual learning and its application to cryptography. Advances in Neural Information Processing Systems, 17."},{"issue":"4","key":"110_CR25","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/s41965-021-00089-9","volume":"3","author":"Z Lv","year":"2021","unstructured":"Lv, Z., Yang, Q., Peng, H., Song, X., & Wang, J. (2021). Computational power of sequential spiking neural P systems with multiple channels. Journal of Membrane Computing, 3(4), 270\u2013283.","journal-title":"Journal of Membrane Computing"},{"key":"110_CR26","doi-asserted-by":"crossref","unstructured":"Mart\u00edn-Vide, C., P\u0103un, G., Pazos, J., Rodr\u00edguez-Pat\u00f3n, A. (2003). Tissue P systems. Theoretical Computer Science, 296(2), 295\u2013326.","DOI":"10.1016\/S0304-3975(02)00659-X"},{"issue":"1","key":"110_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s41965-018-00006-7","volume":"1","author":"R Mayne","year":"2019","unstructured":"Mayne, R., Phillips, N., & Adamatzky, A. (2019). Towards experimental P-systems using multivesicular liposomes. Journal of Membrane Computing, 1(1), 20\u201328.","journal-title":"Journal of Membrane Computing"},{"issue":"4","key":"110_CR28","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/s41965-021-00087-x","volume":"3","author":"S Mi","year":"2021","unstructured":"Mi, S., Zhang, L., Peng, H., & Wang, J. (2021). Medical image fusion based on DTNP systems and Laplacian pyramid. Journal of Membrane Computing, 3(4), 284\u2013295.","journal-title":"Journal of Membrane Computing"},{"key":"110_CR29","doi-asserted-by":"crossref","unstructured":"Michel, O., Jacquemard, F. (2006). An analysis of a public key protocol with membranes. In: Applications of membrane computing, Springer, 283\u2013302.","DOI":"10.1007\/3-540-29937-8_10"},{"key":"110_CR30","doi-asserted-by":"crossref","unstructured":"Mislovaty, R., Perchenok, Y., Kanter, I., & Kinzel, W. (2002). Secure key-exchange protocol with an absence of injective functions. Physical Review E, 66(6), 066102.","DOI":"10.1103\/PhysRevE.66.066102"},{"issue":"3","key":"110_CR31","doi-asserted-by":"publisher","first-page":"273","DOI":"10.15837\/ijccc.2009.3.2435","volume":"4","author":"L Pan","year":"2009","unstructured":"Pan, L., & P\u0103un, G. (2009). Spiking neural P systems with anti-spikes. International Journal of Computers Communications & Control, 4(3), 273\u2013282.","journal-title":"International Journal of Computers Communications & Control"},{"issue":"08","key":"110_CR32","doi-asserted-by":"publisher","first-page":"1750042","DOI":"10.1142\/S0129065717500423","volume":"27","author":"L Pan","year":"2017","unstructured":"Pan, L., P\u0103un, G., Zhang, G., & Neri, F. (2017). Spiking neural P systems with communication on request. International Journal of Neural Systems, 27(08), 1750042.","journal-title":"International Journal of Neural Systems"},{"issue":"3","key":"110_CR33","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1162\/NECO_a_00238","volume":"24","author":"L Pan","year":"2012","unstructured":"Pan, L., Wang, J., & Hoogeboom, H. J. (2012). Spiking neural P systems with astrocytes. Neural Computation, 24(3), 805\u2013825.","journal-title":"Neural Computation"},{"issue":"1","key":"110_CR34","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1006\/jcss.1999.1693","volume":"61","author":"G P\u0103un","year":"2000","unstructured":"P\u0103un, G. (2000). Computing with membranes. Journal of Computer and System Sciences, 61(1), 108\u2013143.","journal-title":"Journal of Computer and System Sciences"},{"key":"110_CR35","doi-asserted-by":"crossref","unstructured":"Salguero\u00a0Dorokhin, \u00c9., Fuertes, W., Lascano, E. (2019). On the development of an optimal structure of tree parity machine for the establishment of a cryptographic key. Security and Communication Networks, 2019.","DOI":"10.1155\/2019\/8214681"},{"issue":"2","key":"110_CR36","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303\u2013332.","journal-title":"SIAM Review"},{"issue":"2","key":"110_CR37","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TNB.2019.2896981","volume":"18","author":"T Song","year":"2019","unstructured":"Song, T., Pan, L., Wu, T., Zheng, P., Wong, M. D., & Rodr\u00edguez-Pat\u00f3n, A. (2019). Spiking neural P systems with learning functions. IEEE Transactions on Nanobioscience, 18(2), 176\u2013190.","journal-title":"IEEE Transactions on Nanobioscience"},{"issue":"4","key":"110_CR38","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1109\/TCDS.2017.2785332","volume":"10","author":"T Song","year":"2017","unstructured":"Song, T., Rodr\u00edguez-Pat\u00f3n, A., Zheng, P., & Zeng, X. (2017). Spiking neural P systems with colored spikes. IEEE Transactions on Cognitive and Developmental Systems, 10(4), 1106\u20131115.","journal-title":"IEEE Transactions on Cognitive and Developmental Systems"},{"key":"110_CR39","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.biosystems.2018.05.004","volume":"169","author":"X Song","year":"2018","unstructured":"Song, X., Wang, J., Peng, H., Ning, G., Sun, Z., Wang, T., & Yang, F. (2018). Spiking neural P systems with multiple channels and anti-spikes. Biosystems, 169, 13\u201319.","journal-title":"Biosystems"},{"key":"110_CR40","doi-asserted-by":"crossref","unstructured":"Stypi\u0144ski, M., Niemiec, M. (2021). Synchronization of Tree Parity Machines using non-binary input vectors. arXiv preprint arXiv:2104.11105.","DOI":"10.1109\/TNNLS.2022.3180197"},{"issue":"4","key":"110_CR41","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s41965-020-00056-w","volume":"2","author":"L Valencia-Cabrera","year":"2020","unstructured":"Valencia-Cabrera, L., P\u00e9rez-Hurtado, I., & Mart\u00ednez-del Amor, M. \u00c1. (2020). Simulation challenges in membrane computing. Journal of Membrane Computing, 2(4), 392\u2013402.","journal-title":"Journal of Membrane Computing"},{"issue":"2","key":"110_CR42","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s41965-020-00037-z","volume":"2","author":"L Valencia-Cabrera","year":"2020","unstructured":"Valencia-Cabrera, L., & Song, B. (2020). Tissue P systems with promoter simulation with MeCoSim and P-Lingua framework. Journal of Membrane Computing, 2(2), 95\u2013107.","journal-title":"Journal of Membrane Computing"},{"issue":"1\u20132","key":"110_CR43","first-page":"37","volume":"15","author":"H Wang","year":"2020","unstructured":"Wang, H., Zhou, K., Zhang, G., Paul, P., Duan, Y., Qi, H., & Rong, H. (2020). Application of weighted Spiking Neural P systems with rules on synapses for breaking RSA encryption. International Journal of Unconventional Computing, 15(1\u20132), 37\u201358.","journal-title":"International Journal of Unconventional Computing"},{"issue":"1","key":"110_CR44","first-page":"32","volume":"20","author":"X Wang","year":"2017","unstructured":"Wang, X., Song, T., Zheng, P., Hao, S., & Ma, T. (2017). Spiking neural P systems with anti-spikes and without annihilating priority. Rammian Journal of Science and Technology, 20(1), 32\u201341.","journal-title":"Rammian Journal of Science and Technology"},{"issue":"3","key":"110_CR45","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s41965-020-00069-5","volume":"3","author":"T Wu","year":"2021","unstructured":"Wu, T., & Jiang, S. (2021). Spiking neural P systems with a flat maximally parallel use of rules. Journal of Membrane Computing, 3(3), 221\u2013231.","journal-title":"Journal of Membrane Computing"},{"issue":"8","key":"110_CR46","doi-asserted-by":"crossref","first-page":"3349","DOI":"10.1109\/TNNLS.2017.2726119","volume":"29","author":"T Wu","year":"2017","unstructured":"Wu, T., P\u0103un, A., Zhang, Z., & Pan, L. (2017). Spiking neural P systems with polarizations. IEEE Transactions on Neural Networks and Learning Systems, 29(8), 3349\u20133360.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"110_CR47","doi-asserted-by":"crossref","unstructured":"Yahya, R.I., Shamsuddin, S.M., Yahya, S.I., Hasan, S., Al-Salibi, B., Al-Khafaji, G. (2016). Image segmentation using membrane computing: a literature survey. In: International Conference on Bio-Inspired Computing: Theories and Applications, Springer, 314\u2013335.","DOI":"10.1007\/978-981-10-3611-8_26"},{"key":"110_CR48","doi-asserted-by":"crossref","unstructured":"Zandron, C., Ferretti, C., Mauri, G. (2001). Solving NP-complete problems using P systems with active membranes. In: Unconventional Models of Computation, UMC\u20192K, Springer, 289\u2013301.","DOI":"10.1007\/978-1-4471-0313-4_21"},{"key":"110_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, G., Zhang, X., Rong, H., Paul, P., Zhu, M., Neri, F., Ong, Y.S. (2022). A layered spiking neural system for classification problems. International Journal of Neural Systems, 2250023.","DOI":"10.1142\/S012906572250023X"},{"issue":"4","key":"110_CR50","doi-asserted-by":"publisher","first-page":"568","DOI":"10.3390\/e24040568","volume":"24","author":"X Zhang","year":"2022","unstructured":"Zhang, X., & Liu, X. (2022). Multiview clustering of adaptive sparse representation based on coupled P systems. Entropy, 24(4), 568.","journal-title":"Entropy"}],"container-title":["Journal of Membrane Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41965-022-00110-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41965-022-00110-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41965-022-00110-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T22:15:53Z","timestamp":1728598553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41965-022-00110-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["110"],"URL":"https:\/\/doi.org\/10.1007\/s41965-022-00110-9","relation":{},"ISSN":["2523-8906","2523-8914"],"issn-type":[{"value":"2523-8906","type":"print"},{"value":"2523-8914","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"10 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}