{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:08:59Z","timestamp":1730236139371,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866675","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:12:11Z","timestamp":1406740331000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["A digital watermarking algorithm based on Chinese remainder theorem"],"prefix":"10.1109","author":[{"given":"Xiao Feng","family":"Luo","sequence":"first","affiliation":[]},{"given":"Qiaozhi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Junxing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Applications of Chinese Remainder Theorem in Cryptography Technology","year":"2006","author":"huang","key":"3"},{"journal-title":"Applications of Chinese Remainder Theorem in Cryptography","year":"2012","author":"liu","key":"2"},{"key":"10","first-page":"141","article-title":"Multi-secret sharing scheme based on RSA and remainder theorem","volume":"37","author":"qia","year":"2011","journal-title":"Computer Engineering"},{"journal-title":"Elementary Number Theory","year":"1978","author":"jingrun","key":"1"},{"key":"7","first-page":"135","article-title":"Database watermarking based on Chinese remainder theorem","volume":"7","author":"guifang","year":"2006","journal-title":"Computer Engineering and Applications"},{"key":"6","first-page":"611","article-title":"Use digital watermarking to protect GIS data by Chinese remaindering","volume":"9","author":"xu","year":"2004","journal-title":"Journal of Image and Graphics"},{"journal-title":"The Research of Weighted Threshold Secret Sharing Based on General Chinese Remainder Theorem","year":"2012","author":"chen","key":"5"},{"key":"4","first-page":"1062","article-title":"A group signature scheme based on Chinese remainder theorem","volume":"7","author":"zewen","year":"2004","journal-title":"Acta Electronica Sinica"},{"key":"9","first-page":"449","article-title":"Fast public key encryption scheme based on the Chinese remainder theorem","volume":"35","author":"baocang","year":"2008","journal-title":"Journal of Xidian Universiry"},{"key":"8","first-page":"56","article-title":"Research on LSB watermark technology","volume":"18","author":"ruqi","year":"2010","journal-title":"Journal of Beijing Institute of Graphic Communication"},{"key":"11","first-page":"34","article-title":"Improved group signature scheme based on Chinese remainder theorem","volume":"38","author":"song","year":"2008","journal-title":"Journal of Southeast University (Natural Science Edition)"},{"key":"12","first-page":"98","article-title":"Forward secure group signature scheme based on Chinese remainder theorem","volume":"31","author":"hai-wen","year":"2011","journal-title":"Journal of Computer Applications"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866675.pdf?arnumber=6866675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:16:16Z","timestamp":1490289376000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866675","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}