{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T03:25:23Z","timestamp":1770348323393,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"15-16","license":[{"start":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T00:00:00Z","timestamp":1578268800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T00:00:00Z","timestamp":1578268800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11042-019-08479-z","type":"journal-article","created":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T16:02:42Z","timestamp":1578326562000},"page":"10781-10803","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Data security over wireless transmission for enterprise multimedia security with fountain codes"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6514-1689","authenticated-orcid":false,"given":"Hongli","family":"Nie","sequence":"first","affiliation":[]},{"given":"Xutong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Wenda","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Song","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,6]]},"reference":[{"issue":"1","key":"8479_CR1","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TMM.2010.2093511","volume":"13","author":"S Ahmad","year":"2011","unstructured":"Ahmad S, Hamzaoui R, Al-Akaidi MM (2011) Unequal error protection using fountain codes with applications to video communication. IEEE Trans Multimed 13 (1):92\u2013101","journal-title":"IEEE Trans Multimed"},{"key":"8479_CR2","doi-asserted-by":"crossref","unstructured":"Bogino MC, Cataldi P, Grangetto M, Magli E, Olmo G (2007) Sliding-window digital fountain codes for streaming of multimedia contents. In: 2007 IEEE International symposium on circuits and systems, pp 3467\u20133470","DOI":"10.1109\/ISCAS.2007.378373"},{"key":"8479_CR3","doi-asserted-by":"crossref","unstructured":"Bohli JM, Hessler A, Ugus O, Westhoff D (2009) Security enhanced multi-hop over the air reprogramming with fountain codes. In: 2009 IEEE 34th Conference on local computer networks, pp 850\u2013857","DOI":"10.1109\/LCN.2009.5355011"},{"issue":"8","key":"8479_CR4","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/JSAC.2002.803996","volume":"20","author":"JW Byers","year":"2002","unstructured":"Byers JW, Luby M, Mitzenmacher M (2002) A digital fountain approach to asynchronous reliable multicast. IEEE J Selected Areas Commun 20(8):1528\u20131540","journal-title":"IEEE J Selected Areas Commun"},{"issue":"6","key":"8479_CR5","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1109\/TIP.2010.2042985","volume":"19","author":"P Cataldi","year":"2010","unstructured":"Cataldi P, Grangetto M, Tillo T, Magli E, Olmo G (2010) Sliding-window raptor codes for efficient scalable wireless video broadcasting with unequal loss protection. IEEE Trans Image Process 19(6):1491\u20131503","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"8479_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TIFS.2014.2362848","volume":"10","author":"S Chen","year":"2015","unstructured":"Chen S, Pande A, Zeng K, Mohapatra P (2015) Live video forensics: source identification in lossy wireless networks. IEEE Trans Inform Forens Secur 10(1):28\u201339","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"8479_CR7","unstructured":"Diao Z (2017) Cloud-based support for massively multiplayer online role-playing games. Ph.D. thesis, University of Magdeburg, Germany. http:\/\/nbn-resolving.de\/urn:nbn:de:gbv:ma9:1-9429"},{"key":"8479_CR8","doi-asserted-by":"publisher","unstructured":"Dong B, Chen Z, Wang HW, Tang LA, Zhang K, Lin Y, Li Z, Chen H (2017) Efficient discovery of abnormal event sequences in enterprise security systems. In: Proceedings of the 2017 ACM on conference on information and knowledge management, CIKM \u201917. https:\/\/doi.org\/http:\/\/doi.acm.org\/10.1145\/3132847.3132854. ACM, New York, pp 707\u2013715, DOI https:\/\/doi.org\/10.1145\/3132847.3132854, (to appear in print)","DOI":"10.1145\/3132847.3132854"},{"key":"8479_CR9","doi-asserted-by":"crossref","unstructured":"Du Q, Li W, Song H (2017) Security enhancement via dynamic fountain code for wireless multicast. In: International conference on wireless algorithms, systems, and applications, pp 509\u2013521","DOI":"10.1007\/978-3-319-60033-8_44"},{"key":"8479_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/8404219","volume":"2018","author":"Q Du","year":"2018","unstructured":"Du Q, Xu Y, Li W, Song H (2018) Security enhancement for multicast over internet of things by dynamically constructed fountain codes. Wirel Commun Mob Comput 2018:1\u201311","journal-title":"Wirel Commun Mob Comput"},{"key":"8479_CR11","first-page":"1","volume":"2018","author":"W Gong","year":"2018","unstructured":"Gong W, Qi L, Xu Y (2018) Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel Commun Mob Comput 2018:1\u20138","journal-title":"Wirel Commun Mob Comput"},{"key":"8479_CR12","doi-asserted-by":"crossref","unstructured":"Hallman RA, Li S, Chang V (2018) 2nd international workshop on multimedia privacy and security. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security - CCS \u201918, pp 2173\u20132174","DOI":"10.1145\/3243734.3243876"},{"key":"8479_CR13","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.future.2017.03.029","volume":"83","author":"MS Hossain","year":"2017","unstructured":"Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2017) Cloud-assisted secure video transmission and sharing framework for smart cities. Futur Gener Comput Syst 83:596\u2013606","journal-title":"Futur Gener Comput Syst"},{"key":"8479_CR14","doi-asserted-by":"crossref","unstructured":"Huang W, Xia Y, Ding L, Xu Y, Yang F, He D, Zhang W (2015) Hierarchical qoe model for wireless video streaming with fountain codes. In: 2015 IEEE international symposium on broadband multimedia systems and broadcasting, pp 1\u20136","DOI":"10.1109\/BMSB.2015.7177233"},{"issue":"11","key":"8479_CR15","doi-asserted-by":"publisher","first-page":"13,383","DOI":"10.1007\/s11042-016-3745-z","volume":"76","author":"T Huang","year":"2017","unstructured":"Huang T, Yi B, Yao W, Li W (2017) Unequal error protection scheme for image transmission based on regularized variable-node and expanding window fountain codes. Multimed Tools Appl 76(11):13,383\u201313,400","journal-title":"Multimed Tools Appl"},{"key":"8479_CR16","unstructured":"Lee WC (1982) Mobile communications engineering. McGraw-Hill Professional"},{"key":"8479_CR17","doi-asserted-by":"crossref","unstructured":"Li W, Du Q, Sun L, Ren P, Wang Y (2016) Security enhanced via dynamic fountain code design for wireless delivery. In: 2016 IEEE Wireless communications and networking conference, pp 1\u20136","DOI":"10.1109\/WCNC.2016.7565065"},{"key":"8479_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0821-5","volume-title":"Wireless communications under hostile jamming: security and efficiency","author":"T Li","year":"2018","unstructured":"Li T, Song T, Liang Y (2018) Wireless communications under hostile jamming: security and efficiency. Springer, Singapore"},{"issue":"2","key":"8479_CR19","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/LCOMM.2010.02.092080","volume":"14","author":"G Liva","year":"2010","unstructured":"Liva G, Paolini E, Chiani M (2010) Performance versus overhead for fountain codes over f q. IEEE Commun Lett 14(2):178\u2013180","journal-title":"IEEE Commun Lett"},{"issue":"5","key":"8479_CR20","first-page":"37","volume":"45","author":"PG L\u00f3pez","year":"2015","unstructured":"L\u00f3pez PG, Montresor A, Epema DHJ, Datta A, Higashino T, Iamnitchi A, Barcellos MP, Felber P, Riviere\u0300 E (2015) Edge-centric computing: vision and challenges. ACM Special Interest Group on Data Communication 45(5):37\u201342","journal-title":"ACM Special Interest Group on Data Communication"},{"key":"8479_CR21","doi-asserted-by":"crossref","unstructured":"Luby M (2002) Lt codes. In: The 43rd Annual IEEE symposium on foundations of computer science, 2002. Proceedings, p 271","DOI":"10.1109\/SFCS.2002.1181950"},{"issue":"5","key":"8479_CR22","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/5.4440","volume":"76","author":"JL Massey","year":"1988","unstructured":"Massey JL (1988) An introduction to contemporary cryptology. Proc IEEE 76 (5):533\u2013549","journal-title":"Proc IEEE"},{"issue":"5","key":"8479_CR23","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/LCOMM.2014.030914.140030","volume":"18","author":"H Niu","year":"2014","unstructured":"Niu H, Iwai M, Sezaki K, Sun L, Du Q (2014) Exploiting fountain codes for secure wireless delivery. IEEE Commun Lett 18(5):777\u2013780","journal-title":"IEEE Commun Lett"},{"key":"8479_CR24","doi-asserted-by":"publisher","first-page":"46,926","DOI":"10.1109\/ACCESS.2018.2866641","volume":"6","author":"L Qi","year":"2018","unstructured":"Qi L, Dou W, Wang W, Li G, Yu H, Wan S (2018) Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access 6:46,926\u201346,937","journal-title":"IEEE Access"},{"key":"8479_CR25","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.future.2018.02.050","volume":"88","author":"L Qi","year":"2018","unstructured":"Qi L, Zhang X, Dou W, Hu C, Yang C, Chen J (2018) A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Futur Gener Comput Syst 88:636\u2013643","journal-title":"Futur Gener Comput Syst"},{"key":"8479_CR26","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.jnca.2018.11.010","volume":"126","author":"A Seba","year":"2019","unstructured":"Seba A, Nouali-Taboudjemat N, Badache N, Seba H (2019) A review on security challenges of wireless communications in disaster emergency response and crisis management situations. J Netw Comput Appl 126:150\u2013161","journal-title":"J Netw Comput Appl"},{"issue":"9","key":"8479_CR27","doi-asserted-by":"publisher","first-page":"2510","DOI":"10.1109\/TCOMM.2009.09.070616","volume":"57","author":"D Sejdinovic","year":"2009","unstructured":"Sejdinovic D, Vukobratovic D, Doufexi A, Senk V, Piechocki RJ (2009) Expanding window fountain codes for unequal error protection. IEEE Trans Commun 57(9):2510\u20132516","journal-title":"IEEE Trans Commun"},{"issue":"6","key":"8479_CR28","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","volume":"14","author":"A Shokrollahi","year":"2006","unstructured":"Shokrollahi A (2006) Raptor codes. IEEE Trans Inform Theory 14(6):2551\u20132567","journal-title":"IEEE Trans Inform Theory"},{"key":"8479_CR29","first-page":"305","volume":"73","author":"R Sorokin","year":"2018","unstructured":"Sorokin R, Rougier JL (2018) Video conference in the fog: an economical approach based on enterprise desktop grid. Annales Des munications 73:305\u2013316","journal-title":"Annales Des munications"},{"key":"8479_CR30","doi-asserted-by":"crossref","unstructured":"Stecklina O, Kornemann S, Grehl F, Jung R, Kranz T, Leander G, Schweer D, Mollus K, Westhoff D (2015) Custom-fit security for efficient and pollution-resistant multicast ota-programming with fountain codes. In: 2015 15th international conference on innovations for community services (I4CS), pp 1\u20138","DOI":"10.1109\/I4CS.2015.7294492"},{"key":"8479_CR31","doi-asserted-by":"crossref","unstructured":"Sun K, Wu D (2016) Mpc-based delay-aware fountain codes for live video streaming. In: 2016 IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC.2016.7510691"},{"key":"8479_CR32","unstructured":"Sun K, Zhang H, Wu D (2016) Delay-aware fountain codes for video streaming with optimal sampling strategy. arXiv:https:\/\/arxiv.org\/abs\/1605.03236"},{"issue":"1","key":"8479_CR33","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TII.2015.2509442","volume":"12","author":"L Sun","year":"2016","unstructured":"Sun L, Ren P, Du Q, Wang Y (2016) Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans Indust Inform 12(1):291\u2013300","journal-title":"IEEE Trans Indust Inform"},{"issue":"1","key":"8479_CR34","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/JIOT.2016.2577520","volume":"5","author":"K Sun","year":"2018","unstructured":"Sun K, Zhang H, Wu DO, Zhuang H (2018) Mpc-based delay-aware fountain codes for real-time video communication. IEEE Internet Things J 5(1):415\u2013424","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"8479_CR35","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1109\/TMM.2009.2026087","volume":"11","author":"D Vukobratovic","year":"2009","unstructured":"Vukobratovic D, Stankovic V, Sejdinovic D, Stankovic L, Xiong Z (2009) Scalable video multicast using expanding window fountain codes. IEEE Trans Multimed 11(6):1094\u20131104","journal-title":"IEEE Trans Multimed"},{"key":"8479_CR36","doi-asserted-by":"crossref","unstructured":"Wagner J, Chakareski J, Frossard P (2006) Streaming of scalable video from multiple servers using rateless codes. In: 2006 IEEE international conference on multimedia and expo, pp 1501\u20131504","DOI":"10.1109\/ICME.2006.262827"},{"issue":"9","key":"8479_CR37","doi-asserted-by":"publisher","first-page":"4427","DOI":"10.1109\/TVT.2011.2171773","volume":"60","author":"X Wang","year":"2011","unstructured":"Wang X, Chen W, Cao Z (2011) Sparc: superposition-aided rateless coding in wireless relay systems. IEEE Trans Veh Technol 60(9):4427\u20134438. https:\/\/doi.org\/10.1109\/TVT.2011.2171773","journal-title":"IEEE Trans Veh Technol"},{"key":"8479_CR38","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.jnca.2018.09.006","volume":"124","author":"X Xu","year":"2018","unstructured":"Xu X, Fu S, Qi L, Zhang X, Liu Q, He Q, Li S (2018) An iot-oriented data placement method with privacy preservation in cloud environment. J Netw Comput Appl 124:148\u2013157","journal-title":"J Netw Comput Appl"},{"key":"8479_CR39","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jnca.2019.02.008","volume":"133","author":"X Xu","year":"2019","unstructured":"Xu X, Li Y, Huang T, Xue Y, Peng K, Qi L, Dou W (2019) An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J Netw Comput Appl 133:75\u201385","journal-title":"J Netw Comput Appl"},{"key":"8479_CR40","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.future.2018.12.055","volume":"95","author":"X Xu","year":"2019","unstructured":"Xu X, Liu Q, Luo Y, Peng K, Zhang X, Meng S, Qi L (2019) A computation offloading method over big data for iot-enabled cloud-edge computing. Futur Gener Comput Syst 95:522\u2013533","journal-title":"Futur Gener Comput Syst"},{"key":"8479_CR41","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.future.2019.01.012","volume":"96","author":"X Xu","year":"2019","unstructured":"Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Futur Gener Comput Syst 96:89\u2013100","journal-title":"Futur Gener Comput Syst"},{"key":"8479_CR42","doi-asserted-by":"crossref","unstructured":"Yu H, Wang Y, Liu Y (2016) Cooperative video coding scheme with fountain code on the concentration on data size. In: 2016 IEEE international conference on network infrastructure and digital content (IC-NIDC), pp 337\u2013341","DOI":"10.1109\/ICNIDC.2016.7974592"},{"issue":"5","key":"8479_CR43","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1109\/TVT.2006.874547","volume":"55","author":"X Zhang","year":"2006","unstructured":"Zhang X, Du Q (2006) Adaptive low-complexity erasure-correcting code-based protocols for qos-driven mobile multicast services over wireless networks. IEEE Trans Veh Technol 55(5):1633\u20131647. https:\/\/doi.org\/10.1109\/TVT.2006.874547","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08479-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08479-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08479-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:42:31Z","timestamp":1609807351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08479-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,6]]},"references-count":43,"journal-issue":{"issue":"15-16","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["8479"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08479-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,6]]},"assertion":[{"value":"30 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}