{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:59Z","timestamp":1750307579430,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656092","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"918-922","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication"],"prefix":"10.1145","author":[{"given":"Ali Mohammed Noori","family":"Hasan","sequence":"first","affiliation":[{"name":"Baghdad University"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"issue":"1701","key":"e_1_3_2_1_1_1","first-page":"353","article-title":"Engineering chaos for secure communication systems","author":"Hasler M.","year":"1995","unstructured":"M. Hasler , \" Engineering chaos for secure communication systems ,\" Phil. Trans. R. Soc. London A , no. 1701 , p. 353 , Oct. 1995 . M. Hasler, \"Engineering chaos for secure communication systems,\" Phil. Trans. R. Soc. London A, no. 1701, p. 353, Oct. 1995.","journal-title":"Phil. Trans. R. Soc. London A"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(96)00179-X"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.904880"},{"key":"e_1_3_2_1_4_1","first-page":"21","volume-title":"IEEE International Symposium on Circuits and Systems, 2006. ISCAS 2006. Proceedings.","author":"Li C. Y.","year":"2006","unstructured":"C. Y. Li , J. S. Chen , and T. Y. Chang . A chaos-based pseudo random number generator using timing-based reseeding method . In IEEE International Symposium on Circuits and Systems, 2006. ISCAS 2006. Proceedings. , pages 21 -- 24 , 2006 . C. Y. Li, J. S. Chen, and T. Y. Chang. A chaos-based pseudo random number generator using timing-based reseeding method. In IEEE International Symposium on Circuits and Systems, 2006. ISCAS 2006. Proceedings., pages 21--24, 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.39"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863934"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","first-page":"316","volume-title":"Proceedings of Progress in Cryptology-IndoCrypt","author":"Li S.","year":"2001","unstructured":"S. Li , X. Mou , and Y. Cai . Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography . In Proceedings of Progress in Cryptology-IndoCrypt 2001 , Lecture Notes in Computer Science , volume 2247 , pages 316 -- 329 . Springer-Verlag , 2001. S. Li, X. Mou, and Y. Cai. Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. In Proceedings of Progress in Cryptology-IndoCrypt 2001, Lecture Notes in Computer Science, volume 2247, pages 316--329. Springer-Verlag, 2001."},{"key":"e_1_3_2_1_8_1","first-page":"26","volume-title":"Proceedings of IEEE Int. Symp. Commmunications and Infor- mation Technology","volume":"2","author":"Klomkarn K.","year":"2004","unstructured":"K. Klomkarn , A. Jansri , and P. Sooraksa . A design of stream cipher based on multichaotic functions . In Proceedings of IEEE Int. Symp. Commmunications and Infor- mation Technology , volume 2 , pages 26 -- 29 , 2004 . K. Klomkarn, A. Jansri, and P. Sooraksa. A design of stream cipher based on multichaotic functions. In Proceedings of IEEE Int. Symp. Commmunications and Infor- mation Technology, volume 2, pages 26--29, 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"Department of Electrical Engineering","author":"Zhou H.","year":"1996","unstructured":"H. Zhou , \" A design methodology of chaotic stream ciphers and the realization problems in finite precision,\" Ph. D. thesis , Department of Electrical Engineering , Fudan University , Shanghai, China 1996 . H. Zhou, \"A design methodology of chaotic stream ciphers and the realization problems in finite precision,\" Ph.D. thesis, Department of Electrical Engineering, Fudan University, Shanghai, China 1996."},{"key":"e_1_3_2_1_10_1","volume-title":"Xi'an","author":"Shujun Li.","year":"2003","unstructured":"Li. Shujun , \" Analyses and New Designs of Digital Chaotic Ciphers ,\" Ph D thesis , School of Electronic and Information Engineering , Xi'an Jiaotong University , 2003 . Li. Shujun, \"Analyses and New Designs of Digital Chaotic Ciphers,\" PhD thesis, School of Electronic and Information Engineering, Xi'an Jiaotong University, 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19980680"},{"key":"e_1_3_2_1_12_1","volume-title":"Techniques Avanc\u00e9es,\" cours 5\u00e8me ann\u00e9e, \u00e0 Polytech 'Nantes","author":"Assad S. El","year":"2008","unstructured":"S. El Assad , \" Communications Num\u00e9riques : Techniques Avanc\u00e9es,\" cours 5\u00e8me ann\u00e9e, \u00e0 Polytech 'Nantes , 2008 . S. El Assad, \"Communications Num\u00e9riques: Techniques Avanc\u00e9es,\" cours 5\u00e8me ann\u00e9e, \u00e0 Polytech 'Nantes, 2008."}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:13Z","timestamp":1750250473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":12,"alternative-id":["10.1145\/1655925.1656092","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656092","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}