{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:08:31Z","timestamp":1768518511728,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271088"],"award-info":[{"award-number":["62271088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201094"],"award-info":[{"award-number":["62201094"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tii.2024.3431078","type":"journal-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T18:25:34Z","timestamp":1722363934000},"page":"13058-13068","source":"Crossref","is-referenced-by-count":9,"title":["2-D Threshold Hyperchaotic Map and Application in Timed One-Time Password"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2329-6890","authenticated-orcid":false,"given":"Han","family":"Bao","sequence":"first","affiliation":[{"name":"School of Microelectronics and Control Engineering, Changzhou University, Changzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5762-1705","authenticated-orcid":false,"given":"Yuanhui","family":"Su","sequence":"additional","affiliation":[{"name":"School of Microelectronics and Control Engineering, Changzhou University, Changzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3529-0541","authenticated-orcid":false,"given":"Zhongyun","family":"Hua","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0370-9141","authenticated-orcid":false,"given":"Quan","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Microelectronics and Control Engineering, Changzhou University, Changzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1841-7608","authenticated-orcid":false,"given":"Mo","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Microelectronics and Control Engineering, Changzhou University, Changzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6413-3038","authenticated-orcid":false,"given":"Bocheng","family":"Bao","sequence":"additional","affiliation":[{"name":"School of Microelectronics and Control Engineering, Changzhou University, Changzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s41559-022-01787-y"},{"issue":"1","key":"ref2","first-page":"1","article-title":"Chaos theory and applications: The physical evidence, mechanism are important in chaotic systems","volume":"4","author":"Ma","year":"2022","journal-title":"Chaos Theory Appl."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.51537\/chaos.975419"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3121428"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.51537\/chaos.936679"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0370-1573(99)00096-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2019.2960694"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3351693"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3339582"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111723"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113627"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3155599"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2022.3206747"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3327566"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113791"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3117865"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3118646"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.12.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119923"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.111994"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2023.01.008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2020.3022539"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112519"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3119387"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2023.3299016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1063\/5.0043458"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114303"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2833049"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010153"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127418501444"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127419500949"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/fi12100160"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3129512"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7540891"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0259448"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3157296"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6238","article-title":"TOTP: Time-based one-time password algorithm","author":"M\u2019Raihi","year":"2011"},{"key":"ref38","first-page":"357","article-title":"A usability study of five two-factor authentication methods","volume-title":"Proc. 15 Symp. Usable Privacy Secur. (SOUPS 2019)","author":"Reese","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3169214"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07968-x"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9424\/10745137\/10614840.pdf?arnumber=10614840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T14:52:19Z","timestamp":1732719139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10614840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":40,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tii.2024.3431078","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}