{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:42:27Z","timestamp":1743108147793,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030902346"},{"type":"electronic","value":"9783030902353"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90235-3_51","type":"book-chapter","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T00:02:58Z","timestamp":1637020978000},"page":"587-599","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Algebraic Operations-Based Secret-Key Design for Encryption Algorithm (ASKEA) for Energy Informatics and Smart Internet of Things (IoT) Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5982-2592","authenticated-orcid":false,"given":"Abbas M.","family":"Al-Ghaili","sequence":"first","affiliation":[]},{"given":"Hairoladenan","family":"Kasim","sequence":"additional","affiliation":[]},{"given":"Ridha","family":"Omar","sequence":"additional","affiliation":[]},{"given":"Zainuddin","family":"Hassan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7318-8185","authenticated-orcid":false,"given":"Naif M.","family":"Al-Hada","sequence":"additional","affiliation":[]},{"given":"Jihua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,16]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Liu, L., Wang, Q., Wu, Y.: QR code positioning algorithm. In: The 2nd International Conference on Computing and Data Science, Stanford, CA, USA (2021)","DOI":"10.1145\/3448734.3450895"},{"key":"51_CR2","doi-asserted-by":"crossref","unstructured":"Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.: A New Encryption Scheme Method (ESM) using capsulated-layers conception for verified QR-Tag for IoT-based smart access systems. In: Balas, V.E., Solanki, V.K., Kumar, R., Khari, M. (Eds.) Internet of Things and Big Data Analytics for Smart Generation, Cham, Springer International Publishing, pp. 77\u2013103 (2019)","DOI":"10.1007\/978-3-030-04203-5_5"},{"key":"51_CR3","doi-asserted-by":"crossref","unstructured":"Ramalho, J.F.C.B. et al.: Super modules-based active QR codes for smart trackability and IoT: a responsive-banknotes case study. npj Flexible Electron. 4, (1), 11 (2020)","DOI":"10.1038\/s41528-020-0073-1"},{"issue":"2","key":"51_CR4","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/MCOM.2018.1700330","volume":"56","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Choo, K.K.R., Grossschadl, J.: Securing edge devices in the post-quantum internet of things using lattice-based cryptography. IEEE Commun. Mag. 56(2), 158\u2013162 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Neisse, R., Baldini, G., Steri, G., Ahmad, A., Fourneret, E., Legeard, B.: Improving Internet of Things device certification with policy-based management, In: 2017 Global Internet of Things Summit (GIoTS). Vol. 6\u20139, pp. 1\u20136 (2017)","DOI":"10.1109\/GIOTS.2017.8016273"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Rane, S., Dubey, A., Parida, T.: Design of IoT based intelligent parking system using image processing algorithms. In: 2017 International Conference on Computing Methodologies and Communication (ICCMC), pp. 1049\u20131053 (2017)","DOI":"10.1109\/ICCMC.2017.8282631"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"Xiao-Long, W., Chun-Fu, W., Guo-Dong, L., Qing-Xie, C.: A robot navigation method based on RFID and QR code in the warehouse. In: 2017 Chinese Automation Congress (CAC), vol. 20\u201322, pp. 7837\u20137840 (2017)","DOI":"10.1109\/CAC.2017.8244199"},{"issue":"10","key":"51_CR8","doi-asserted-by":"publisher","first-page":"9458","DOI":"10.1109\/TVT.2017.2703631","volume":"66","author":"M Ghaffari","year":"2017","unstructured":"Ghaffari, M., Ghadiri, N., Manshaei, M.H., Lahijani, M.S.: P4QS: a peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans. Veh. Technol. 66(10), 9458\u20139469 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"51_CR9","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","volume":"6","author":"K Sha","year":"2020","unstructured":"Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 6(2), 195\u2013202 (2020)","journal-title":"Digit. Commun. Netw."},{"key":"51_CR10","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.procs.2019.11.018","volume":"160","author":"S Parikh","year":"2019","unstructured":"Parikh, S., Dave, D., Patel, R., Doshi, N.: Security and privacy issues in cloud, fog and edge computing. Procedia Comput. Sci. 160, 734\u2013739 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Al-Ghaili, A.M., Kasim, H., Othman, M., Hassan, Z.: Security factors based evaluation of verification algorithm for an IoT access system. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds.) Recent Trends in Data Science and Soft Computing, Cham, Springer International Publishing, pp. 384\u2013395, (2019)","DOI":"10.1007\/978-3-319-99007-1_37"},{"issue":"3","key":"51_CR12","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/TIFS.2015.2506546","volume":"11","author":"I Tkachenko","year":"2016","unstructured":"Tkachenko, I., Puech, W., Destruel, C., Strauss, O., Gaudin, J.M., Guichard, C.: Two-Level QR code for private message sharing and document authentication. IEEE Trans. Inf. Forensics Secur. 11(3), 571\u2013583 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"51_CR13","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1109\/TMM.2015.2437711","volume":"17","author":"SS Lin","year":"2015","unstructured":"Lin, S.S., Hu, M.C., Lee, C.H., Lee, T.Y.: Efficient QR code beautification with high quality visual content. IEEE Trans. Multimedia 17(9), 1515\u20131524 (2015)","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"51_CR14","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TII.2015.2514097","volume":"12","author":"PY Lin","year":"2016","unstructured":"Lin, P.Y.: Distributed secret sharing approach with cheater prevention based on QR code. IEEE Trans. Industr. Inf. 12(1), 384\u2013392 (2016)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"6","key":"51_CR15","doi-asserted-by":"publisher","first-page":"2588","DOI":"10.1109\/TMECH.2017.2762598","volume":"22","author":"P Nazemzadeh","year":"2017","unstructured":"Nazemzadeh, P., Fontanelli, D., Macii, D., Palopoli, L.: Indoor localization of mobile robots through QR code detection and dead reckoning data fusion. IEEE\/ASME Trans. Mechatron. 22(6), 2588\u20132599 (2017)","journal-title":"IEEE\/ASME Trans. Mechatron."},{"key":"51_CR16","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.future.2013.08.006","volume":"38","author":"T Kirkham","year":"2014","unstructured":"Kirkham, T., Armstrong, D., Djemame, K., Jiang, M.: Risk driven Smart Home resource management using cloud services. Futur. Gener. Comput. Syst. 38, 13\u201322 (2014)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"51_CR17","doi-asserted-by":"crossref","unstructured":"Chen, Y.H., Tsai, M.J., Fu, L.C., Chen, C.H., Wu, C.L., Zeng, Y.C.: Monitoring elder\u2019s living activity using ambient and body sensor network in smart home. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2962\u20132967 (2015)","DOI":"10.1109\/SMC.2015.515"},{"key":"51_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.comnet.2015.12.015","volume":"101","author":"L Kanaris","year":"2016","unstructured":"Kanaris, L., Kokkinis, A., Fortino, G., Liotta, A., Stavrou, S.: Sample size determination algorithm for fingerprint-based indoor localization systems. Comput. Netw. 101, 169\u2013177 (2016)","journal-title":"Comput. Netw."},{"key":"51_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.comcom.2016.03.004","volume":"89\u201390","author":"M Gentili","year":"2016","unstructured":"Gentili, M., Sannino, R., Petracca, M.: BlueVoice: voice communications over Bluetooth Low Energy in the Internet of Things scenario. Comput. Commun. 89\u201390, 51\u201359 (2016)","journal-title":"Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90235-3_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T17:41:26Z","timestamp":1699810886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90235-3_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030902346","9783030902353"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90235-3_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IVIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Visual Informatics Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kajang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ivic2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ivic2021.uniten.edu.my\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"114","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"One keynote paper is included. Conference held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}