{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:40:10Z","timestamp":1750196410640,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T00:00:00Z","timestamp":1619136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,23]]},"DOI":"10.1145\/3467707.3467744","type":"proceedings-article","created":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T16:06:53Z","timestamp":1632499613000},"page":"244-251","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Factorization of Odd Integers as Random Walks on Valuated Binary Trees"],"prefix":"10.1145","author":[{"given":"Xingbo","family":"Wang","sequence":"first","affiliation":[{"name":"Foshan University, China"}]},{"given":"Jinfeng","family":"Luo","sequence":"additional","affiliation":[{"name":"Foshan University, China"}]},{"given":"Ying","family":"Tian","sequence":"additional","affiliation":[{"name":"Foshan University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,9,24]]},"reference":[{"volume-title":"Mehta and Sartaj Sahni","year":"2005","author":"P.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"8","article-title":"An overview of Cryptography","volume":"3","author":"Phulachand Kharate\u00a0Sunita","year":"2016","journal-title":"Innovation in IT"},{"key":"e_1_3_2_1_3_1","first-page":"21","article-title":"An overview to Integer factorization and RSA in Cryptography","volume":"2","author":"Sarnaik Sonal","year":"2014","journal-title":"International Journal for Advance Research in Engineering and Thechnology"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.17706\/ijapm.2020.10.4.135-142"},{"key":"e_1_3_2_1_5_1","first-page":"3","article-title":"Valuated Binary Tree: A New Approach in Study of Integers","volume":"5","author":"Wang Xingbo","year":"2007","journal-title":"International Journal of Scientific and Innovative Mathematical Research"},{"volume-title":"T3 Tree and Its Traits in Understanding Integers. Advances in Pure Mathematics 8, 5","year":"2018","author":"Wang Xingbo","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17706\/jsw.15.3.86-97"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3844\/jmssp.2020.24.34"}],"event":{"name":"ICCAI '21: 2021 7th International Conference on Computing and Artificial Intelligence","acronym":"ICCAI '21","location":"Tianjin China"},"container-title":["2021 7th International Conference on Computing and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3467707.3467744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3467707.3467744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:07Z","timestamp":1750195507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3467707.3467744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,23]]},"references-count":8,"alternative-id":["10.1145\/3467707.3467744","10.1145\/3467707"],"URL":"https:\/\/doi.org\/10.1145\/3467707.3467744","relation":{},"subject":[],"published":{"date-parts":[[2021,4,23]]},"assertion":[{"value":"2021-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}