{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:24:11Z","timestamp":1725805451124},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662450482"},{"type":"electronic","value":"9783662450499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45049-9_12","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T10:07:14Z","timestamp":1411121234000},"page":"73-77","source":"Crossref","is-referenced-by-count":8,"title":["An Improved Method of DNA Information Encryption"],"prefix":"10.1007","author":[{"given":"Guangzhao","family":"Cui","sequence":"first","affiliation":[]},{"given":"Dong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zicheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L. Adleman","year":"1994","unstructured":"Adleman, L.: Molecular computation of solutions to combinational problems. J. Science\u00a0266(11), 1021\u20131024 (1994)","journal-title":"J. Science"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1089\/cmb.1999.6.53","volume":"6","author":"L. Adleman","year":"1999","unstructured":"Adleman, L., et al.: On applying molecular computation to the data encryption standard. J. Journal of Computational Biology\u00a06(1), 53\u201363 (1999)","journal-title":"J. Journal of Computational Biology"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0304-3975(02)00134-2","volume":"287","author":"M. Amos","year":"2002","unstructured":"Amos, M., et al.: Topics in the theory of DNA computing. J. Theoretical Computer Science\u00a0287(1), 3\u201338 (2002)","journal-title":"J. Theoretical Computer Science"},{"issue":"11","key":"12_CR4","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1016\/j.camwa.2008.10.038","volume":"57","author":"X.C. Zhang","year":"2009","unstructured":"Zhang, X.C., Wang, Y.F., Cui, G.Z., et al.: Application of a novel IWO to the design of encoding sequences for DNA computing. J. Computers & Mathematics with Applications\u00a057(11), 2001\u20132008 (2009)","journal-title":"J. Computers & Mathematics with Applications"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.1126\/science.1200520","volume":"332","author":"L. Qian","year":"2011","unstructured":"Qian, L., Winfree, E.: Scaling up digital circuit computation with DNA strand displacement cascades. J. Science\u00a0332, 1196\u20131201 (2011)","journal-title":"J. Science"},{"key":"12_CR6","first-page":"233","volume":"54","author":"A. Gehani","year":"2000","unstructured":"Gehani, A., LaBean, T.H., Reif, J.H.: DNA-based cryptography. DNA Based Computers V. Providence: American Mathematical Society\u00a054, 233\u2013249 (2000)","journal-title":"Providence: American Mathematical Society"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.biosystems.2005.01.004","volume":"81","author":"T. Kazuo","year":"2005","unstructured":"Kazuo, T., Akimitsu, O., Isao, S.: Public-key system using DNA as a one-way function for key distribution. J. Biosystems\u00a081, 25\u201329 (2005)","journal-title":"J. Biosystems"},{"issue":"12","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1007\/s11434-006-2012-5","volume":"51","author":"G.Z. Xiao","year":"2006","unstructured":"Xiao, G.Z., Lu, M.X., Qin, L., et al.: New field of cryptography: DNA cryptography. J. Chinese Science Bullentin\u00a051(12), 1413\u20131420 (2006)","journal-title":"J. Chinese Science Bullentin"},{"issue":"3","key":"12_CR9","doi-asserted-by":"publisher","first-page":"181","DOI":"10.4236\/ns.2009.13023","volume":"1","author":"S.-H. Jiao","year":"2009","unstructured":"Jiao, S.-H., Goutte, R.: Hiding data in DNA of living organisms. J. Natural Science\u00a01(3), 181\u2013184 (2009)","journal-title":"J. Natural Science"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/21092","volume":"399","author":"C.T. Celland","year":"1999","unstructured":"Celland, C.T., Risca, V., Bancroft, C.: Hiding messages in DNA microdots. J. Nature\u00a0399, 533\u2013534 (1999)","journal-title":"J. Nature"},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0303-2647(00)00083-6","volume":"57","author":"A. Leier","year":"2000","unstructured":"Leier, A., Richter, C., Banzhaf, W., et al.: Cryptography with DNA binary strands. J. Biosystems\u00a057(1), 13\u201322 (2000)","journal-title":"J. Biosystems"},{"issue":"7","key":"12_CR12","first-page":"1216","volume":"32","author":"N.N. Rao","year":"2004","unstructured":"Rao, N.N.: A cryptosystem based on recombinant DNA technique. J. Acta Electronica Sinica\u00a032(7), 1216\u20131218 (2004)","journal-title":"J. Acta Electronica Sinica"},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/s11432-010-0063-3","volume":"53","author":"X.J. Lai","year":"2010","unstructured":"Lai, X.J., Lu, M.X., Qin, L., et al.: Asymmetric encryption and signature method with DNA technology. J. Science China Information Sciences\u00a053(3), 506\u2013514 (2010)","journal-title":"J. Science China Information Sciences"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Abbasy, M.R., Shanmugam, B.: Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. In: Proceedings of the 2011 IEEE World Congress on Services, pp. 385\u2013390 (2011)","DOI":"10.1109\/SERVICES.2011.45"},{"issue":"1","key":"12_CR15","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.jtbi.2010.12.038","volume":"273","author":"L. Morford","year":"2011","unstructured":"Morford, L.: A theoretical application of selectable markers in bacterial episomes for a DNA cryptosystem. J. Journal of Theoretical Biology\u00a0273(1), 100\u2013102 (2011)","journal-title":"J. Journal of Theoretical Biology"},{"key":"12_CR16","first-page":"179","volume-title":"2012 8th International Conference on Information Science and Digital Content Technology (ICIDT)","author":"Y. Zhang","year":"2012","unstructured":"Zhang, Y., Fu, B., Zhang, X.: DNA cryptography based on DNA Fragment assembly. In: 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT), pp. 179\u2013182. IEEE Press, Jeju (2012)"},{"issue":"1","key":"12_CR17","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11047-012-9334-9","volume":"12","author":"M. Babaei","year":"2013","unstructured":"Babaei, M.: A novel text and image encryption method based on chaos theory and DNA computing. J. Natural Computing\u00a012(1), 101\u2013107 (2013)","journal-title":"J. Natural Computing"},{"issue":"4","key":"12_CR18","first-page":"760","volume":"16","author":"W.C. Chen","year":"2000","unstructured":"Chen, W.C., Chen, Z.H., et al.: Digital coding of the genetic codons and DNA sequences in high dimension space. J. Acta Biophysica Sinica\u00a016(4), 760\u2013768 (2000)","journal-title":"J. Acta Biophysica Sinica"},{"issue":"11","key":"12_CR19","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1016\/j.ins.2010.01.030","volume":"180","author":"H.J. Shiu","year":"2010","unstructured":"Shiu, H.J., Ng, K.L., Fang, J.F., et al.: Data hiding methods based upon DNA sequences. J. Information Sciences\u00a0180(11), 2196\u20132208 (2010)","journal-title":"J. Information Sciences"},{"issue":"8","key":"12_CR20","first-page":"104","volume":"45","author":"G.Z. Cui","year":"2009","unstructured":"Cui, G.Z., Qin, L.M., Wang, Y.F., et al.: Encryption scheme research based on DNA technology. J. Computer Engineering and Applications\u00a045(8), 104\u2013106 (2009)","journal-title":"J. Computer Engineering and Applications"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing - Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45049-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T23:06:38Z","timestamp":1558998398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45049-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662450482","9783662450499"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45049-9_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}