{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:02Z","timestamp":1750221122218,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316657","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"130-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model"],"prefix":"10.1145","author":[{"given":"Moatsum","family":"Alawida","sequence":"first","affiliation":[{"name":"Universiti Sains Malaysia, Penang Malaysia"}]},{"given":"Azman","family":"Samsudin","sequence":"additional","affiliation":[{"name":"Universiti Sains Malaysia, Penang Malaysia"}]},{"given":"Wafa' Hamdan","family":"Alshoura","sequence":"additional","affiliation":[{"name":"Universiti Sains Malaysia, Penang Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arroyo D. Amigo J. M. and Li S. and Alvarez G. 2010. On the inadequacy of unimodal maps for cryptographic applications in: J. D. Ferrer A. M. Ballest\u00e9 J. C. Roca A. S. G\u00f3mez (Eds.) XI Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u0131a y Seguridad de la Informaci\u00f3n (XI RECSI) Universitat Rovira i Virgili Tarragona Spain 2010 pp. 37--42 ISBN 978-84-693-3304-4.  Arroyo D. Amigo J. M. and Li S. and Alvarez G. 2010. On the inadequacy of unimodal maps for cryptographic applications in: J. D. Ferrer A. M. Ballest\u00e9 J. C. Roca A. S. G\u00f3mez (Eds.) XI Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u0131a y Seguridad de la Informaci\u00f3n (XI RECSI) Universitat Rovira i Virgili Tarragona Spain 2010 pp. 37--42 ISBN 978-84-693-3304-4."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Alawida M. Samsudin A. and Teh J.S. 2019. Enhancing unimodal digital chaotic maps through hybridization. Nonlinear Dynamic.  Alawida M. Samsudin A. and Teh J.S. 2019. Enhancing unimodal digital chaotic maps through hybridization. Nonlinear Dynamic.","DOI":"10.1007\/s11071-019-04809-w"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.02.016"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.05.011"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.028"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183115500229"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.10.031"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.11.027"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2736515"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2103332"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(01)00612-0"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Liu L. and Miao S. 2015. A universal method for improving the dynamical degradation of a digital chaotic system. Phys. Scr. 90 085205 (10pp).  Liu L. and Miao S. 2015. A universal method for improving the dynamical degradation of a digital chaotic system. Phys. Scr. 90 085205 (10pp).","DOI":"10.1088\/0031-8949\/90\/8\/085205"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.02.031"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Teh J. S. and Samsudin A. 2017. A Chaos-Based Authenticated Cipher with Associated Data. Security and Communication Networks. (2017). 15.  Teh J. S. and Samsudin A. 2017. A Chaos-Based Authenticated Cipher with Associated Data. Security and Communication Networks. (2017). 15.","DOI":"10.1155\/2017\/9040518"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Teh J. S. Samsudin A. and Akhavan A. 2015. Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dynamics. (2015) 81:1067--1079.  Teh J. S. Samsudin A. and Akhavan A. 2015. Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dynamics. (2015) 81:1067--1079.","DOI":"10.1007\/s11071-015-2049-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Teh J.S. Tan K. and Alawida M. 2018. A chaos-based keyed hash function based on fixed point representation. Cluster Comput (2018).  Teh J.S. Tan K. and Alawida M. 2018. A chaos-based keyed hash function based on fixed point representation. Cluster Comput (2018).","DOI":"10.1007\/s10586-018-2870-z"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119191865821"},{"key":"e_1_3_2_1_19_1","first-page":"12","article-title":"Discrete wheel-switching chaotic system and applications","volume":"61","author":"Wu Y.","year":"2014","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers, VOL."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2012.11.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2747012.2747107"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.04.021"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2363168"}],"event":{"name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","sponsor":["University of New Brunswick University of New Brunswick"],"location":"Penang Malaysia","acronym":"ICSCA '19"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:11Z","timestamp":1750208531000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":23,"alternative-id":["10.1145\/3316615.3316657","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316657","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}