{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:40Z","timestamp":1725808420783},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_22","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"197-205","source":"Crossref","is-referenced-by-count":0,"title":["Neuro-key Generation Based on HEBB Network for Wireless Communication"],"prefix":"10.1007","author":[{"given":"Arindam","family":"Sarkar","sequence":"first","affiliation":[]},{"given":"J. K.","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"Pritha","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Kahate, A.: Cryptography and Network Security. Tata McGraw-Hill Publishing Company Limited (2003), Eighth reprint (2006)"},{"key":"22_CR2","unstructured":"http:\/\/people.csail.mit.edu\/rivest\/Rsapaper.pdf"},{"key":"22_CR3","unstructured":"Sivanandam, S.N., Deepa, S.N.: Principles of Soft Computing. Wiley-India (2008), Reprint (2012)"},{"key":"22_CR4","unstructured":"Arindam, S., Mandal, J.K.: Artificial Neural Network Guided Secured Communication Techniques: A Practical Approach. LAP Lambert Academic Publishing (June 04, 2012) (2012) ISBN: 978-3-659-11991-0"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Arindam, S., Karforma, S., Mandal, J.K.: Object Oriented Modeling of IDEA using GA based Efficient Key Generation for E-Governance Security (OOMIG). International Journal of Distributed and Parallel Systems (IJDPS) 3(2) (March 2012), doi:10.5121\/ijdps.2012.3215, ISSN: 0976- 9757 [Online] ; 2229 - 3957 [Print]. Indexed by: EBSCO, DOAJ, NASA, Google Scholar, INSPEC and WorldCat, 2011","DOI":"10.5121\/ijdps.2012.3215"},{"key":"22_CR6","unstructured":"Mandal, J.K., Arindam, S.: Neural Session Key based Triangularized Encryption for Online Wireless Communication (NSKTE). In: 2nd National Conference on Computing and Systems (NaCCS 2012), Department of Computer Science, The University of Burdwan, Golapbag North, Burdwan \u2013713104, West Bengal, India, March 15-16 (2012) ISBN 978-93-808131-8-9"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,21]],"date-time":"2023-01-21T04:21:00Z","timestamp":1674274860000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_22","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}