{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T14:47:56Z","timestamp":1748616476493},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_32","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T06:33:13Z","timestamp":1477031593000},"page":"343-351","source":"Crossref","is-referenced-by-count":1,"title":["Design and implementation of software consistency detection system based on Netty framework"],"prefix":"10.1007","author":[{"given":"Jun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Haipeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lifang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Guowei","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"32_CR1","unstructured":"Huang Y. DIGITAL WATERMARKING TECHNIQUE USING HVS AND STATISTICAL CHARACTERISTIC OF IMAGE[J]. Computer Applications & Software, 2004"},{"key":"32_CR2","unstructured":"Tao S Q, Chang X R. Software Protection of Power System based on the Encryption Lock[J]. Computer Security, 2010"},{"key":"32_CR3","unstructured":"Hao Y H, Liu H B, Zheng L, et al. Software Piracy-proof Method Based on USB Encryption Lock[J]. Computer Engineering, 2010, 36(23):119-120"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Huang X L, Zhou L, Li J. A Consistency Detection Method of Power Quality Data Interchange Format File[J]. Applied Mechanics & Materials, 2013, 411-414:1465-1469","DOI":"10.4028\/www.scientific.net\/AMM.411-414.1465"},{"key":"32_CR5","unstructured":"Pimentel V,Nickerson B.G.Communicating and Displaying Real-Time Data with WebSocket"},{"key":"32_CR6","unstructured":"JBoss.Netty projec[CP t \/OL][. 2012-4-1]. http:\/\/netty.io\/"},{"key":"32_CR7","unstructured":"Java Message Service[EB\/OL]. http:\/\/java.sun.com\/products\/jms\/"},{"key":"32_CR8","unstructured":"Jin Z G, Wei L I. Design and implementation of HTTP client based on Netty[J]. Telecom Engineering Technics & Standardization, 2014"},{"key":"32_CR9","unstructured":"Shang C W, Liu Q T, Zhao G, et al. Study on Mechanism of Consistency Detection in BPEL Activities Authorization Coordination Based on CPN[J]. Computer Science, 2014"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:47:34Z","timestamp":1498340854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_32","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}