{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:14:48Z","timestamp":1742926488614,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_40","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"564-574","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Mobile Data Leakage Prevention System Based on Encryption Algorithms"],"prefix":"10.1007","author":[{"given":"Wen","family":"Shen","sequence":"first","affiliation":[]},{"given":"Hongzhang","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"issue":"5","key":"40_CR1","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/JIOT.2017.2714189","volume":"4","author":"X Cheng","year":"2017","unstructured":"Cheng, X., Fang, L., Yang, L., Cui, S.: Mobile big data: the fuel for data-driven wireless. IEEE Internet Things J. 4(5), 1489\u20131516 (2017)","journal-title":"IEEE Internet Things J."},{"key":"40_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/IWCMC51323.2021.9498774","volume":"2021","author":"X Yin","year":"2021","unstructured":"Yin, X., He, J., Gao, Y., Li, J.: Multi-source data analysis method of exhibition site based on mobile internet. Int. Wireless Commun. Mobile Comput. (IWCMC) 2021, 41\u201344 (2021)","journal-title":"Int. Wireless Commun. Mobile Comput. (IWCMC)"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, Q.: An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In: 2021 2nd International Conference on Computing and Data Science (CDS), pp. 616\u2013622 (2021)","DOI":"10.1109\/CDS52072.2021.00111"},{"issue":"10","key":"40_CR4","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1109\/TCAD.2019.2939330","volume":"39","author":"X Zheng","year":"2020","unstructured":"Zheng, X., Xu, C., Hu, X., Zhang, Y., Xiong, X.: The software\/hardware co-design and implementation of SM2\/3\/4 encryption\/decryption and digital signature System. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10), 2055\u20132066 (2020)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"40_CR5","first-page":"46","volume":"2020","author":"IMADS Atmaja","year":"2020","unstructured":"Atmaja, I.M.A.D.S., Astawa, I.N.G.A., Wisswani, N.W., Nugroho, I.M.R.A., Sunu, P.W., Wiratama, I.K.: Document encryption through asymmetric RSA cryptography. Int. Conf. Appl. Sci. Technol. (iCAST) 2020, 46\u201349 (2020)","journal-title":"Int. Conf. Appl. Sci. Technol. (iCAST)"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Rajeshwaran, K., Kumar, K.A.: Cellular automata based hashing algorithm (cabha) for strong cryptographic hash function. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1\u20136 (2019)","DOI":"10.1109\/ICECCT.2019.8869146"},{"issue":"12","key":"40_CR7","doi-asserted-by":"publisher","first-page":"10061","DOI":"10.1109\/JIOT.2021.3118079","volume":"9","author":"T Li","year":"2022","unstructured":"Li, T., et al.: Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J. 9(12), 10061\u201310076 (2022)","journal-title":"IEEE Internet Things J."},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Jin, C., Zeng, Z., Miao, W., Bao, Z., Zhang, R.: A nonlinear white-box SM4 implementation applied to edge IoT agents. In: 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2), pp. 3358\u20133363 (2021)","DOI":"10.1109\/EI252483.2021.9713048"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, R., Zhang, H., Chen, J., Liu, X., Ma, L.: Research on terminal security technology of ubiquitous power internet of things based on PUF and SM3. In: 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2), pp. 910\u2013915 ( 2019)","DOI":"10.1109\/EI247390.2019.9062264"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Wang, T., et al.: The research of the SM2, SM3 and SM4 Algorithms in WLAN of transformer substation. In: 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 276\u2013283 (2019)","DOI":"10.1109\/EITCE47263.2019.9095029"},{"key":"40_CR11","first-page":"915","volume":"2021","author":"S Zang","year":"2021","unstructured":"Zang, S., et al.: IEEE 5th advanced information technology. Electron. Autom. Control Conf. (IAEAC) 2021, 915\u2013919 (2021)","journal-title":"Electron. Autom. Control Conf. (IAEAC)"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, R., Han, L., Xie, J.: Research and implementation of parallel optimization of SM3 algorithm based on multithread. In: 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), pp. 330\u201333 (2022)","DOI":"10.1109\/ICSP54964.2022.9778455"},{"issue":"5","key":"40_CR13","doi-asserted-by":"publisher","first-page":"3784","DOI":"10.1109\/JIOT.2021.3100097","volume":"9","author":"X Feng","year":"2022","unstructured":"Feng, X., Ma, J., Liu, S., Miao, Y., Liu, X., Choo, K.-K.R.: Transparent ciphertext retrieval system supporting integration of encrypted heterogeneous database in cloud-assisted IoT. IEEE Internet Things J. 9(5), 3784\u20133798 (2022)","journal-title":"IEEE Internet Things J."},{"key":"40_CR14","doi-asserted-by":"publisher","first-page":"168547","DOI":"10.1109\/ACCESS.2021.3135050","volume":"9","author":"H He","year":"2021","unstructured":"He, H., Chen, R., Liu, C., Feng, K., Zhou, X.: An efficient ciphertext retrieval scheme based on homomorphic encryption for multiple data owners in hybrid cloud. IEEE Access 9, 168547\u2013168557 (2021)","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T13:48:12Z","timestamp":1729518492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}