{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:02:50Z","timestamp":1729645370691,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/ijcnn.2004.1380988","type":"proceedings-article","created":{"date-parts":[[2011,9,16]],"date-time":"2011-09-16T16:02:36Z","timestamp":1316188956000},"page":"2319-2324 vol.3","source":"Crossref","is-referenced-by-count":0,"title":["A combined genetic optimization and multilayer perceptron methodology for efficient digital fingerprint modeling and evaluation in secure communications"],"prefix":"10.1109","member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050406"},{"key":"2","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/0-387-34805-0_39","article-title":"A design principle for hash functions, advances in cryptography, Crypto '89","volume":"435","author":"damgard","year":"1989","journal-title":"Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544327"},{"key":"1","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-39118-5_19","article-title":"Collision free hash functions and public key signature schemes","volume":"304","author":"damgard","year":"1987","journal-title":"Advances in Cryptography - Eurocrypt '93 Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(05)80007-8"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)82016-0"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"journal-title":"Security in Computing","year":"1997","author":"pfleeger","key":"9"},{"journal-title":"Network and Internetwork Security","year":"1995","author":"stallings","key":"8"},{"journal-title":"Secure Hash Standard","year":"1995","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(98)00011-X"}],"event":{"name":"2004 IEEE International Joint Conference on Neural Networks","start":{"date-parts":[[2004,7,25]]},"location":"Budapest, Hungary","end":{"date-parts":[[2004,7,29]]}},"container-title":["2004 IEEE International Joint Conference on Neural Networks (IEEE Cat No 04CH37541) IJCNN-04"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9486\/30107\/01380988.pdf?arnumber=1380988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T02:28:17Z","timestamp":1497925697000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1380988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2004.1380988","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}