{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:25:16Z","timestamp":1742948716531,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319574622"},{"type":"electronic","value":"9783319574639"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57463-9_9","type":"book-chapter","created":{"date-parts":[[2017,4,13]],"date-time":"2017-04-13T02:50:28Z","timestamp":1492051828000},"page":"129-149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Idology and Its Applications in Public Security and Network Security"],"prefix":"10.1007","author":[{"given":"Shenghui","family":"Su","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Shuwang","family":"L\u00fc","sequence":"additional","affiliation":[]},{"given":"Zhiqiu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zhoujun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhenmin","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,14]]},"reference":[{"key":"9_CR1","unstructured":"Schuman, M.: Why Alibaba\u2019s Massive Counterfeit Problem Will Never be Solved. Forbes, 23 November 2015"},{"key":"9_CR2","unstructured":"Levy, A.: Amazon\u2019s Chinese Counterfeit Problem is Getting Worse. CNBC, 8 July 2016"},{"key":"9_CR3","unstructured":"Walsh, D.: Fake Diplomas, Real Cash: Pakistani Company Axact Reaps Millions. The New York Times, 17 May 2015"},{"key":"9_CR4","unstructured":"Vedelago, C., Houston, C.: Australia Flooded with Fake $50 Notes So Good They Fool Banks. Sydney Morning Herald, 28 February 2016"},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03055-0","volume-title":"The Law of Corporate Finance: General Principles and EU Law. Volume III: Funding, Exit, Takeovers","author":"P M\u00e4ntysaari","year":"2010","unstructured":"M\u00e4ntysaari, P.: The Law of Corporate Finance: General Principles and EU Law. Volume III: Funding, Exit, Takeovers. Springer, Heidelberg (2010)"},{"key":"9_CR6","unstructured":"Horowitz, M.: Router security - subnets and IP addresses, 3 June 2015. \n                      http:\/\/routersecurity.org\/ipaddresses.php"},{"key":"9_CR7","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2010","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice-Hall, New Jersey (2010)","edition":"5"},{"key":"9_CR8","unstructured":"McDowell, M.: Avoiding social engineering and phishing attacks. US Computer Emergency Readiness Team, 22 October 2009. \n                      https:\/\/www.us-cert.gov\/ncas\/tips\/ST04\u2013014\n                      \n                    . Accessed 06 Feb 2013"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Bicknell, D.E., Laporte, G.M.: Forged and counterfeit documents. In: Wiley Encyclopedia of Forensic Science. Wiley, September 2009","DOI":"10.1002\/9780470061589.fsa327"},{"key":"9_CR10","unstructured":"Lichter, S.: Federal and state wiretap act regulation of keyloggers in the workplace. Harvard J. Law Technol. (2012)"},{"key":"9_CR11","unstructured":"Editors of the American Heritage Dictionaries: American Heritage Dictionary of the English Language, 5th edn. Houghton Mifflin Harcourt Publishing, November 2011"},{"key":"9_CR12","unstructured":"Editors of the American Heritage Dictionaries: American Heritage Roget\u2019s Thesaurus. Houghton Mifflin Harcourt Publishing, July 2013"},{"key":"9_CR13","volume-title":"The Around Five Millenniums of China (in Chinese)","author":"H Yu","year":"2009","unstructured":"Yu, H., Li, N.: The Around Five Millenniums of China (in Chinese). Huawen Press, Beijing (2009)"},{"key":"9_CR14","unstructured":"Oracle: Attestation of Identity Information, May 2006. \n                      http:\/\/www.economist.com"},{"key":"9_CR15","unstructured":"Paton, W.R. (Translator): Polybius: The Histories, vol. III, Books 5\u20138 (Loeb Classical Library No. 138). Harvard University Press, January 1923"},{"key":"9_CR16","volume-title":"The Chinese History Illustrated by Pictures (in Chinese)","author":"Q Ran","year":"2011","unstructured":"Ran, Q.: The Chinese History Illustrated by Pictures (in Chinese). Higher Education Press, Beijing (2011)"},{"key":"9_CR17","volume-title":"A History of Graphic Design","author":"PB Meggs","year":"1998","unstructured":"Meggs, P.B.: A History of Graphic Design, 3rd edn. Wiley, New York (1998)","edition":"3"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Richardson, G.: Brand names before the industrial revolution (NBER Working Paper No. 13930). National Bureau of Economic Research, April 2008","DOI":"10.3386\/w13930"},{"key":"9_CR19","volume-title":"Holographic Technology for Anti-counterfeit Security: Present and Future","author":"SP McGrew","year":"1996","unstructured":"McGrew, S.P.: Holographic Technology for Anti-counterfeit Security: Present and Future. Holo-pack & Holo-print Asia, Singapore (1996)"},{"key":"9_CR20","unstructured":"Yang, C.: Investigation into the shady deal in anti-counterfeit industry (in Chinese). Bus. Circles 4, 48\u201350 (2002)"},{"key":"9_CR21","unstructured":"Denso Adc: QR Code Essentials, 31 March 2011. \n                      www.denso-adc.com\/pdf\/qrcode"},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/328236.328110","volume":"43","author":"A Jain","year":"2000","unstructured":"Jain, A., Hong, L., Pankanti, S.: Biometric identification. Commun. ACM 43(2), 91\u201398 (2000)","journal-title":"Commun. ACM"},{"key":"9_CR23","unstructured":"Olsen, R.D.: The chemical composition of palmar sweat. Fingerprint Ident. Mag. 53(10), 3\u20137, 14\u201316, 23 (1972)"},{"key":"9_CR24","volume-title":"Firearms and Fingerprints (Essentials of Forensic Science Set, 7-Volumes)","author":"E Hueske","year":"2008","unstructured":"Hueske, E.: Firearms and Fingerprints (Essentials of Forensic Science Set, 7-Volumes). Infobase Publishing, New York (2008)"},{"key":"9_CR25","unstructured":"Schneier, B.: Fake anti-counterfeiting holograms, 13 February 2007. \n                      https:\/\/www.schneier.com\/blog\/archives\/2007\/02\/fake_anticounte.html"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-18455-5_6","volume-title":"Intelligence and Security Informatics","author":"S Su","year":"2015","unstructured":"Su, S., Li, N., L\u00fc, S.: Drug anti-forgery and tracing system based on lightweight asymmetric identities. In: Chau, M., Wang, G.Alan, Chen, H. (eds.) PAISI 2015. LNCS, vol. 9074, pp. 82\u201390. Springer, Cham (2015). doi:\n                      10.1007\/978-3-319-18455-5_6"},{"key":"9_CR27","unstructured":"Walton, C.A.: Portable radio frequency emitting identifier. U.S. Patent 4384288, 17 May 1983"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"SE Sarma","year":"2003","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski, B.S., Ko\u00e7, \u00e7, Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454\u2013469. Springer, Heidelberg (2003). doi:\n                      10.1007\/3-540-36400-5_33"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-540-39881-3_3","volume-title":"Security in Pervasive Computing","author":"F Stajano","year":"2004","unstructured":"Stajano, F.: Security in pervasive computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 6\u20138. Springer, Heidelberg (2004). doi:\n                      10.1007\/978-3-540-39881-3_3"},{"key":"9_CR30","unstructured":"Hu, X.: An innovation the same sharp as a sword is created through the ten years (in Chinese). Inf. Securi. Commun. Priv. 6, 27\u201329 (2012)"},{"key":"9_CR31","unstructured":"Zou, W., Liu, S.: A Staffer of CSRC Who Was Involved the Inside Dealing and the Forging of Official Documents and Stamps Is Required to Aid in the Investigation (in Chinese). Beijing Youth Daily, 26 August 2015"},{"issue":"4","key":"9_CR32","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9_CR33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"IF Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge, UK (1999)"},{"issue":"2","key":"9_CR34","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"9_CR35","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.tcs.2011.12.011","volume":"426\u2013427","author":"S Su","year":"2012","unstructured":"Su, S., L\u00fc, S.: A public key cryptosystem based on three new provable problems. Theor. Comput. Sci. 426\u2013427, 91\u2013117 (2012)","journal-title":"Theor. Comput. Sci."},{"issue":"39","key":"9_CR36","doi-asserted-by":"publisher","first-page":"5374","DOI":"10.1016\/j.tcs.2011.06.008","volume":"412","author":"S Su","year":"2011","unstructured":"Su, S., L\u00fc, S., Fan, X.: Asymptotic granularity reduction and its application. Theor. Comput. Sci. 412(39), 5374\u20135386 (2011)","journal-title":"Theor. Comput. Sci."},{"key":"9_CR37","volume-title":"The Undecidable: Basic Papers on Undecidable Propositions, Unsolvable Problems and Computable Functions","author":"M Davis","year":"2004","unstructured":"Davis, M.: The Undecidable: Basic Papers on Undecidable Propositions, Unsolvable Problems and Computable Functions. Dover Publications, Mineola (2004)"},{"key":"9_CR38","volume-title":"Introduction to the Theory of Computation","author":"M Sipser","year":"1997","unstructured":"Sipser, M.: Introduction to the Theory of Computation. PWS Publishing, Boston (1997)"},{"key":"9_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A Menezes","year":"1993","unstructured":"Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)"},{"key":"9_CR40","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)","edition":"2"},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.tcs.2016.02.023","volume":"654","author":"S Su","year":"2016","unstructured":"Su, S., Xie, T., L\u00fc, S.: A provably secure non-iterative hash function resisting birthday attack. Theor. Comput. Sci. 654, 128\u2013142 (2016)","journal-title":"Theor. Comput. Sci."},{"key":"9_CR42","unstructured":"Su, S., L\u00fc, S.: REESSE1+\u00a0\u2022 Reward \u2022 Proof by experiment \u2022 A new approach to proof of P !\u00a0=\u00a0NP. Cornell University Library (2009). \n                      http:\/\/arxiv.org\/pdf\/0908.0482\n                      \n                    . Accessed 2014"},{"key":"9_CR43","unstructured":"Yang, A.: Math 25: introduction to number theory (Class 20 Notes). Department of Mathematics, Dartmouth College, November 2011. \n                      http:\/\/www.math.dartmouth.edu\/~m25f11\/notes\/class20.pdf"},{"key":"9_CR44","unstructured":"Cohen, H.: A Course in Computational Algebraic Number Theory. Springer (2000)"},{"key":"9_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/3-540-46766-1_38","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"D Chaum","year":"1992","unstructured":"Chaum, D., Heijst, E., Pfitzmann, B.: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 470\u2013484. Springer, Heidelberg (1992). doi:\n                      10.1007\/3-540-46766-1_38"},{"key":"9_CR46","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"2001","unstructured":"Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, London, UK (2001)"},{"key":"9_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-69304-8_5","volume-title":"Intelligence and Security Informatics","author":"S Su","year":"2008","unstructured":"Su, S., Cai, Y., Shen, C.: The banknote anti-forgery system based on digital signature algorithms. In: Yang, C.C., et al. (eds.) ISI 2008. LNCS, vol. 5075, pp. 44\u201349. Springer, Heidelberg (2008). doi:\n                      10.1007\/978-3-540-69304-8_5"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Dai, Y., Su, S.: A diploma anti-forgery system based on lightweight digital signatures. In: CIS2014, IEEE, November 2014","DOI":"10.1109\/CIS.2014.44"},{"key":"9_CR49","unstructured":"Izadi, E.: (Under Paris Terror Attack) There\u2019s a Booming Black Market for Fake Syrian Passports. Washington Post, 21 November 2015"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet Protocol Version 6 (IPv6) Specification (RFC 2460). The Internet Society, December 1998","DOI":"10.17487\/rfc2460"},{"issue":"5","key":"9_CR51","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57463-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T02:10:04Z","timestamp":1558318204000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57463-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319574622","9783319574639"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57463-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"14 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAISI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Workshop on Intelligence and Security Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"paisi2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.business.hku.hk\/paisi\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}