{"indexed":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T01:03:03Z","timestamp":1508893383400},"publisher-location":"Berlin\/Heidelberg","reference-count":0,"publisher":"Springer-Verlag","content-domain":{"domain":[],"crossmark-restriction":false},"DOI":"10.1007\/3-540-31662-0_64","type":"chapter","created":{"date-parts":[[2006,8,10]],"date-time":"2006-08-10T14:41:25Z","timestamp":1155220885000},"page":"825-834","source":"Crossref","is-referenced-by-count":0,"title":"Communication Method for Chaotic Encryption in Remote Monitoring Systems for Product e-Manufacturing and e-Maintenance","prefix":"10.1007","author":[{"given":"Chengliang","family":"Liu","affiliation":[]},{"given":"Kun","family":"Xie","affiliation":[]},{"given":"Y.B.","family":"Miao","affiliation":[]},{"given":"Xuan F","family":"Zha","affiliation":[]},{"given":"Zhengjin","family":"Feng","affiliation":[]},{"given":"Jay","family":"Lee","affiliation":[]}],"member":"297","container-title":"Advances in Soft Computing","original-title":[],"link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/3-540-31662-0_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:36:21Z","timestamp":1389040581000},"score":1.0,"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["3540316493"],"references-count":0,"URL":"http:\/\/dx.doi.org\/10.1007\/3-540-31662-0_64","relation":{}}