{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:07Z","timestamp":1750220887679,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371696","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"58-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Embedded Authentication and Blockchain in Micro-course"],"prefix":"10.1145","author":[{"given":"Wu-Chuan","family":"Yang","sequence":"first","affiliation":[{"name":"Dept. of Information Engineering, I-Shou university, Kaohsiung, Taiwan"}]},{"given":"Lien-Yuan","family":"Ting","sequence":"additional","affiliation":[{"name":"Dept. of Information Engineering, I-Shou university, Kaohsiung, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"volume-title":"A Peer-to-Peer Electronic Cash System\", https:\/\/bitcoin.org\/bitcoin.pdf","year":"2008","key":"e_1_3_2_1_1_1","unstructured":"Nakamoto Satoshi, \"Bitcoin : A Peer-to-Peer Electronic Cash System\", https:\/\/bitcoin.org\/bitcoin.pdf , 2008 . Nakamoto Satoshi, \"Bitcoin: A Peer-to-Peer Electronic Cash System\", https:\/\/bitcoin.org\/bitcoin.pdf, 2008."},{"key":"e_1_3_2_1_2_1","unstructured":"Wikipedia Bitcoin https:\/\/en.wikipedia.org\/wiki\/Bitcoin.  Wikipedia Bitcoin https:\/\/en.wikipedia.org\/wiki\/Bitcoin."},{"key":"e_1_3_2_1_3_1","volume-title":"Cryptography and Network Security","author":"Stallings W.","year":"2014","unstructured":"W. Stallings , Cryptography and Network Security , 6 th edition, Pearson , 2014 . W. Stallings, Cryptography and Network Security, 6th edition, Pearson, 2014.","edition":"6"},{"key":"e_1_3_2_1_4_1","volume-title":"2018 IEEE Conference on Dependable and Secure Computing (DSC 2018)","author":"Yang W. C.","year":"2018","unstructured":"W. C. Yang , L. Y. Ting , T. C. Kuo , \"On the Authentication of Certificateless RSA Public Key ,\" 2018 IEEE Conference on Dependable and Secure Computing (DSC 2018) , 2018 .12. W. C. Yang, L. Y. Ting, T. C. Kuo, \"On the Authentication of Certificateless RSA Public Key,\" 2018 IEEE Conference on Dependable and Secure Computing (DSC 2018), 2018.12."},{"key":"e_1_3_2_1_5_1","unstructured":"The data given by the general education center some content can refer to http:\/\/www.cge.isu.edu.tw\/2018\/showpage_v01.php?dept_mno=621&dept_id=5&page_id=28868.  The data given by the general education center some content can refer to http:\/\/www.cge.isu.edu.tw\/2018\/showpage_v01.php?dept_mno=621&dept_id=5&page_id=28868."},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Springer","author":"Lenstra A. K.","year":"1998","unstructured":"A. K. Lenstra , \"Generating RSA Moduli with a Predeter-mined Portion,\" Advances in Cryptology - AsiaCrypt'98, LNCS. 1514 , Springer , pp. 1 -- 10 , 1998 . A. K. Lenstra, \"Generating RSA Moduli with a Predeter-mined Portion,\" Advances in Cryptology - AsiaCrypt'98, LNCS. 1514, Springer, pp. 1--10, 1998."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_9"},{"key":"e_1_3_2_1_8_1","first-page":"665","article-title":"A Method for Embedding Secret Key Information in RSA Public Key and Its Application","author":"Kitahara M.","year":"2012","unstructured":"M. Kitahara , T. Nishide and K. Sakurai , \" A Method for Embedding Secret Key Information in RSA Public Key and Its Application ,\" Advances in Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing , pp. 665 -- 670 , 2012 . M. Kitahara, T. Nishide and K. Sakurai, \"A Method for Embedding Secret Key Information in RSA Public Key and Its Application,\" Advances in Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 665--670, 2012.","journal-title":"Advances in Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing"},{"issue":"3","key":"e_1_3_2_1_9_1","first-page":"51","article-title":"Study on Embedded Specified Data in RSA Moduli","volume":"21","year":"2015","unstructured":"Wu-Chuan Yang , \" Study on Embedded Specified Data in RSA Moduli ,\" Communications of the CCISA , vol. 21 , no. 3 , pp. 51 -- 58 , 2015 . Wu-Chuan Yang, \"Study on Embedded Specified Data in RSA Moduli,\" Communications of the CCISA, vol. 21, no. 3, pp.51--58, 2015.","journal-title":"Communications of the CCISA"},{"key":"e_1_3_2_1_10_1","first-page":"03","article-title":"The MD5 Message-Digest Algorithm,\" https:\/\/www.ietf.org\/rfc\/rfc1321.txt, 1992","author":"R.","year":"2016","unstructured":"RFC1321( R. Revist) , \" The MD5 Message-Digest Algorithm,\" https:\/\/www.ietf.org\/rfc\/rfc1321.txt, 1992 , Browsed in 2016 . 03 . RFC1321(R. Revist), \" The MD5 Message-Digest Algorithm,\" https:\/\/www.ietf.org\/rfc\/rfc1321.txt, 1992, Browsed in 2016.03.","journal-title":"Browsed in"},{"key":"e_1_3_2_1_11_1","unstructured":"NIST FIPS 180-4 \"Secure Hash Standard (SHS) \" http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf 2012.  NIST FIPS 180-4 \"Secure Hash Standard (SHS) \" http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf 2012."},{"key":"e_1_3_2_1_12_1","volume-title":"Permutation-Based Hash and Extendable-Output Functions,\" https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.202.pdf","author":"NIST","year":"2015","unstructured":"NIST FIPS 202, \"SHA-3 Standard : Permutation-Based Hash and Extendable-Output Functions,\" https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.202.pdf , 2015 . NIST FIPS 202, \"SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions,\" https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.202.pdf, 2015."}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":12,"alternative-id":["10.1145\/3371676.3371696","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371696","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}