{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T13:53:43Z","timestamp":1762091623399,"version":"build-2065373602"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11036-023-02196-6","type":"journal-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T13:02:18Z","timestamp":1692363738000},"page":"1007-1018","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of \u201cTraffic Engineering\u201d"],"prefix":"10.1007","volume":"28","author":[{"given":"Hongbin","family":"Cao","sequence":"first","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,18]]},"reference":[{"issue":"3","key":"2196_CR1","first-page":"63","volume":"22","author":"S Liu","year":"2023","unstructured":"Liu S, He T, Li J, Li Y, Kumar A (2023) An effective learning evaluation method based on text data with real-time attribution - a case study for mathematical class with students of junior middle school in China. ACM Trans Asian Low-Resource Lang Inf Process 22(3):63","journal-title":"ACM Trans Asian Low-Resource Lang Inf Process"},{"issue":"9","key":"2196_CR2","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.1021\/acs.jchemed.0c00585","volume":"97","author":"MV Rodic","year":"2020","unstructured":"Rodic MV, Rodic DD (2020) Plans vs reality: reflections on chemical crystallography online teaching during COVID-19. J Chem Educ 97(9):3038\u20133041","journal-title":"J Chem Educ"},{"issue":"5","key":"2196_CR3","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.1007\/s11036-021-01777-7","volume":"26","author":"P Gao","year":"2021","unstructured":"Gao P, Li J, Liu S (2021) An introduction to key technology in artificial intelligence and big data-driven e-learning and e-education. Mobile Netw Appl 26(5):2123\u20132126","journal-title":"Mobile Netw Appl"},{"issue":"12","key":"2196_CR4","doi-asserted-by":"publisher","first-page":"4621","DOI":"10.1109\/TITS.2019.2955548","volume":"20","author":"JD Ser","year":"2019","unstructured":"Ser JD, Sanchez-Medina JJ, Vlahogianni EI (2019) Introduction to the special issue on online learning for big-data driven transportation and mobility. IEEE Trans Intell Transp Syst 20(12):4621\u20134623","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"3","key":"2196_CR5","first-page":"31","volume":"67","author":"RP Nechkoska","year":"2021","unstructured":"Nechkoska RP, Nechovska DK, Angeleski M (2021) Engaging economics and traffic engineering students in community issues using the multicreation approach. Na\u0161e Gospodarstvo\/Our Econ 67(3):31\u201340","journal-title":"Na\u0161e Gospodarstvo\/Our Econ"},{"issue":"10","key":"2196_CR6","first-page":"269","volume":"36","author":"Y Liu","year":"2019","unstructured":"Liu Y, Bai JN (2019) Key data encryption protection simulation of complex electronic information system. Comput Simul 36(10):269\u2013272","journal-title":"Comput Simul"},{"issue":"08","key":"2196_CR7","first-page":"55","volume":"41","author":"PY Han","year":"2020","unstructured":"Han PY, Liu CY, Wang JH, Duan SM, Pan HZ, Fang BX (2020) Research on data encryption system and technology for cloud storage. J Commun 41(08):55\u201365","journal-title":"J Commun"},{"issue":"07","key":"2196_CR8","first-page":"2143","volume":"39","author":"Y Nie","year":"2022","unstructured":"Nie Y, Zheng BW, Chai ZL (2022) AES encryption system based on heterogeneous reconfigurable computing. Appl Res Comput 39(07):2143\u20132148","journal-title":"Appl Res Comput"},{"issue":"09","key":"2196_CR9","first-page":"1660","volume":"46","author":"Z Wu","year":"2020","unstructured":"Wu Z, Bai J, Li DS, Li B, Zeng B, Zhang ZQ (2020) White-box cryptographic video data sharing system based on SM4 algorithm. J Beijing Univ Aeronaut Astronaut 46(09):1660\u20131669","journal-title":"J Beijing Univ Aeronaut Astronaut"},{"issue":"5","key":"2196_CR10","first-page":"828","volume":"21","author":"L Li","year":"2019","unstructured":"Li L, Lv Z, Tong X (2019) A dynamic location privacy protection scheme based on cloud storage. Int J Netw Secur 21(5):828\u2013834","journal-title":"Int J Netw Secur"},{"issue":"4","key":"2196_CR11","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1111\/bjet.13231","volume":"53","author":"MM Ashenafi","year":"2022","unstructured":"Ashenafi MM, Andres-Bray JM, Hutt S (2022) Controlled outputs, full data: A privacy-protecting infrastructure for MOOC data. Brit J Educational Technol 53(4):756\u2013775","journal-title":"Brit J Educational Technol"},{"issue":"4","key":"2196_CR12","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1111\/bjet.13216","volume":"53","author":"S Slade","year":"2022","unstructured":"Slade S, Prinsloo P, Khalil M (2022) The answer is (not only) technological: Considering student data privacy in learning analytics. Br J Edu Technol 53(4):876\u2013893","journal-title":"Br J Edu Technol"},{"issue":"2","key":"2196_CR13","first-page":"1","volume":"2021","author":"Y Wang","year":"2021","unstructured":"Wang Y, Liang X, Hei X (2021) Deep learning data privacy protection based on homomorphic encryption in AIoT. Mobile Inf Syst 2021(2):1\u201311","journal-title":"Mobile Inf Syst"},{"issue":"4","key":"2196_CR14","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.12928\/telkomnika.v19i4.16875","volume":"19","author":"SJ Mohammed","year":"2021","unstructured":"Mohammed SJ, Basheer D (2021) From cloud computing security towards homomorphic encryption: A comprehensive review. Telkomnika (Telecommun Comput Electron Control) 19(4):1152\u20131161","journal-title":"Telkomnika (Telecommun Comput Electron Control)"},{"issue":"99","key":"2196_CR15","doi-asserted-by":"publisher","first-page":"69808","DOI":"10.1109\/ACCESS.2019.2919376","volume":"7","author":"M Li","year":"2019","unstructured":"Li M, Wang L, Fan J (2019) Fidelity preserved data hiding in encrypted highly autocorrelated data based on homomorphism and compressive sensing. IEEE Access 7(99):69808\u201369825","journal-title":"IEEE Access"},{"issue":"11","key":"2196_CR16","first-page":"10","volume":"23","author":"YY Luo","year":"2020","unstructured":"Luo YY, Zhou JZ, Xiong YL (2020) Exploration on rail transit general course education under new engineering science strategy. Urban Mass Transit 23(11):10\u201313+43","journal-title":"Urban Mass Transit"},{"issue":"2","key":"2196_CR17","first-page":"312","volume":"21","author":"KP Kibiwott","year":"2019","unstructured":"Kibiwott KP, Zhang F, Kimeli VK (2019) Privacy preservation for eHealth big data in cloud accessed using resource-constrained devices: survey. Int J Netw Secur 21(2):312\u2013325","journal-title":"Int J Netw Secur"},{"issue":"6","key":"2196_CR18","doi-asserted-by":"publisher","first-page":"3046","DOI":"10.1007\/s11227-018-2691-0","volume":"75","author":"H Kaur","year":"2019","unstructured":"Kaur H, Kumar N, Batra S (2019) ClaMPP: a cloud-based multi-party privacy preserving classification scheme for distributed applications. J Supercomput 75(6):3046\u20133075","journal-title":"J Supercomput"},{"issue":"15","key":"2196_CR19","doi-asserted-by":"publisher","first-page":"113390","DOI":"10.1016\/j.eswa.2020.113390","volume":"152","author":"J Xie","year":"2020","unstructured":"Xie J, Hu K, Zhu M, Guo Y (2020) Bioacoustic signal classification in continuous recordings: Syllable-segmentation vs sliding-window. Expert Syst Appl 152(15):113390","journal-title":"Expert Syst Appl"},{"issue":"4","key":"2196_CR20","first-page":"1","volume":"2020","author":"B Mi","year":"2020","unstructured":"Mi B, Long P, Liu Y (2020) Balancing access control and privacy for data deduplication via functional encryption. Math Probl Eng 2020(4):1\u201311","journal-title":"Math Probl Eng"},{"issue":"9","key":"2196_CR21","doi-asserted-by":"publisher","first-page":"3097","DOI":"10.1021\/acs.jchemed.0c00776","volume":"97","author":"RM Baker","year":"2020","unstructured":"Baker RM, Leonard ME, Milosavljevic BH (2020) The sudden switch to online teaching of an upper-level experimental physical chemistry course: challenges and solutions. J Chem Educ 97(9):3097\u20133101","journal-title":"J Chem Educ"},{"issue":"9","key":"2196_CR22","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1021\/acs.jchemed.0c00763","volume":"97","author":"J M\u00fcssig","year":"2020","unstructured":"M\u00fcssig J, Clark A, Hoermann S, Loporcaro G, Loporcaro C, Huber T (2020) Imparting materials science knowledge in the field of the crystal structure of metals in times of online teaching: a novel online laboratory teaching concept with an augmented reality application. J Chem Educ 97(9):2643\u20132650","journal-title":"J Chem Educ"},{"issue":"3","key":"2196_CR23","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1007\/s11036-022-01953-3","volume":"27","author":"C Peng","year":"2022","unstructured":"Peng C, Zhou X, Liu S (2022) An introduction to artificial intelligence and machine learning for online education. Mobile Netw Appl 27(3):1147\u20131150","journal-title":"Mobile Netw Appl"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02196-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02196-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02196-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T14:53:12Z","timestamp":1714747992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02196-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2196"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02196-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"29 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no declared conflicts of interest or competing interests that relate to the article\u2019s content.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interests\/Competing Interests"}}]}}