{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:16:16Z","timestamp":1730211376834,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/csndsp.2012.6292797","type":"proceedings-article","created":{"date-parts":[[2012,9,19]],"date-time":"2012-09-19T20:50:30Z","timestamp":1348087830000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Observer-based secure communication using indirect coupled synchronization"],"prefix":"10.1109","author":[{"given":"Rupak","family":"Kharel","sequence":"first","affiliation":[]},{"given":"Krishna","family":"Busawon","sequence":"additional","affiliation":[]},{"given":"Z","family":"Ghassemlooy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.60.320"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1063\/1.1688092"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.58.1159"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/81.989169"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.09.038"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.02.019"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1063\/1.1564934"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00425-3"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-2789(98)00199-7"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2007.910748"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/81.922466"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127492000562"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.71.65"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127496000114"},{"journal-title":"Secure Communication Based on Indirect Coupled Synchronization","year":"2012","author":"kharel","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/81.572346"},{"key":"5","first-page":"81","article-title":"A survey of chaotic secure communication systems","volume":"2","author":"yang","year":"2004","journal-title":"International Journal of Computational Cognition"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127403007072"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1142\/S021812749400068X"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/81.633877"}],"event":{"name":"2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2012)","start":{"date-parts":[[2012,7,18]]},"location":"Poznan, Poland","end":{"date-parts":[[2012,7,20]]}},"container-title":["2012 8th International Symposium on Communication Systems, Networks &amp; Digital Signal Processing (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6273232\/6292634\/06292797.pdf?arnumber=6292797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:29:09Z","timestamp":1490142549000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6292797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/csndsp.2012.6292797","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}