{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:08:29Z","timestamp":1729627709645,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/bigcomp.2016.7425951","type":"proceedings-article","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T21:21:03Z","timestamp":1457385663000},"page":"374-377","source":"Crossref","is-referenced-by-count":0,"title":["Fast prime generation algorithms using proposed GCD test on mobile smart devices"],"prefix":"10.1109","author":[{"family":"Hosung Jo","sequence":"first","affiliation":[]},{"family":"Heejin Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1993-1199989-X"},{"key":"ref11","first-page":"23","article-title":"Edoh, K: Elliptic Curve Cryptography on PocketPCs","volume":"3","year":"2009","journal-title":"International Journal of Security and its Applications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF00202269"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(76)80043-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0022-314X(80)90084-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/0206006"},{"key":"ref16","first-page":"271","article-title":"Performance analysis and improvement of JPV primality test for smart IC cards","author":"jo","year":"2014","journal-title":"Big Data and Smart Computing 2014"},{"key":"ref17","first-page":"1","article-title":"Probabilistic Analysis on JPV algorithm and Improving it using GCD Function","volume":"9","author":"jo","year":"2015","journal-title":"Applied Mathematics and Information Sciences"},{"key":"ref4","first-page":"353","article-title":"Security Requirements of a Mobile Device Management System","volume":"6","author":"rhee","year":"2012","journal-title":"International Journal of Security and its Applications"},{"year":"1991","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1090\/S0025-5718-1987-0866102-2","article-title":"Implementation of a new primality test","volume":"48","author":"henri","year":"1987","journal-title":"Mathematics of Computation"},{"key":"ref5","first-page":"137","article-title":"Security Test Methodology for an Agent of a Mobile Device","volume":"6","author":"rhee","year":"2012","journal-title":"International Journal of Security and its Applications"},{"journal-title":"Introduction to Algorithms","year":"1991","author":"cormen","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-8326(02)00065-6"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"el gmal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref9"}],"event":{"name":"2016 International Conference on Big Data and Smart Computing (BigComp)","start":{"date-parts":[[2016,1,18]]},"location":"Hong Kong, China","end":{"date-parts":[[2016,1,20]]}},"container-title":["2016 International Conference on Big Data and Smart Computing (BigComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7422342\/7425793\/7425951.pdf?arnumber=7425951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T07:49:51Z","timestamp":1498290591000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7425951\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/bigcomp.2016.7425951","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}