{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:47:22Z","timestamp":1773776842619,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T00:00:00Z","timestamp":1663372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T00:00:00Z","timestamp":1663372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11276-022-03064-z","type":"journal-article","created":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T05:07:46Z","timestamp":1663391266000},"page":"345-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A network security algorithm using SVC and sliding window"],"prefix":"10.1007","volume":"29","author":[{"given":"Xuemin","family":"Zhao","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,17]]},"reference":[{"key":"3064_CR1","doi-asserted-by":"crossref","unstructured":"Schwarz, H., Marpe, D., & Wiegand, T. (2007). \u201cOverview of the scalable video coding extension of the H. 264\/AVC standard.\u201c IEEE Transactions on circuits and systems for video technology 17, no. 9 :1103\u20131120","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"3064_CR2","unstructured":"Audio-Video Transport Working Group, Schulzrinne, H., Casner, S., & Frederick, R. (1996). and V. Jacobson. \u201cRFC1889: RTP: A transport protocol for real-time applications.\u201c"},{"issue":"4","key":"3064_CR3","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.jvcir.2011.02.005","volume":"22","author":"G Algin","year":"2011","unstructured":"Algin, G., Boztok, & Turhan Tunali, E. (2011). \u201cScalable video encryption of H. 264 SVC codec.\u201c. Journal of Visual Communication and Image Representation, 22(4), 353\u2013364","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"3064_CR4","unstructured":"Liu Yinming, L., & Jinhai (2000). Liu Guoli, computer security technology. Tsinghua University Press"},{"key":"3064_CR5","unstructured":"Wang, & Yanbo (2003). Xue Tong, applied cryptography. China Machine Press"},{"issue":"3","key":"3064_CR6","first-page":"405","volume":"37","author":"X Lu Ji","year":"2010","unstructured":"Lu Ji, X., Song, W., & Chengke (2010). SVC efficient transmission system based on network coding. Journal of Xi\u2019an University of Electronic Science and technology, 37(3), 405\u2013411","journal-title":"Journal of Xi\u2019an University of Electronic Science and technology"},{"key":"3064_CR7","doi-asserted-by":"crossref","unstructured":"Park, S. W., & Sang-Uk, S. (2008). \u201cEfficient selective encryption scheme for the H. 264\/scalable video coding (SVC).\u201c In 2008 Fourth International Conference on Networked Computing and Advanced Information Management, vol.\u00a01, pp.\u00a0371\u2013376. IEEE,","DOI":"10.1109\/NCM.2008.259"},{"issue":"2","key":"3064_CR8","first-page":"774","volume":"18","author":"SR Zeebaree","year":"2020","unstructured":"Zeebaree, S. R. (2020). \u201cDES encryption and decryption algorithm implementation based on FPGA.\u201c Indones. J Electr Eng Comput Sci, 18(2), 774\u2013781","journal-title":"J Electr Eng Comput Sci"},{"key":"3064_CR9","unstructured":"Shizhong, W., Shixiong, Z., Wenzheng, Z., et al. (2000). applied cryptography protocol, algorithm and C source program (Second Edition), China Machine Press,"},{"key":"3064_CR10","doi-asserted-by":"publisher","unstructured":"Liao, Z., Nazir, S., Khan, H. U., & Shafiq, M. (2021). \u201cAssessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions,\u201c Security and Communication Networks, vol. pp.\u00a01\u201322, 2021, Art no. Article ID 6677867, doi: https:\/\/doi.org\/10.1155\/2021\/6677867","DOI":"10.1155\/2021\/6677867"},{"key":"3064_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2335","author":"B Bai","year":"2020","unstructured":"Bai, B., Nazir, S., Bai, Y., & Anees, A. (2020). Security and Provenance for Internet of Health Things- a systematic literature review,. Journal of Software: Evolution and Process. doi: https:\/\/doi.org\/10.1002\/smr.2335","journal-title":"Journal of Software: Evolution and Process"},{"issue":"2","key":"3064_CR12","first-page":"224","volume":"15","author":"S Nazir","year":"2015","unstructured":"Nazir, S., Shahzad, S., Mahfooz, S., & Jan, M. N. (2015). Fuzzy logic based decision support system for component security evaluation,. International Arab Journal of Information and Technology, 15(2), 224\u2013231","journal-title":"International Arab Journal of Information and Technology"},{"key":"3064_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3017221","author":"L Wang","year":"2020","unstructured":"Wang, L., Ali, Y., Nazir, S., & Niazi, M. (2020). \u201cISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods,\u201cIEEE Access, 8,152316\u2013152332, doi: https:\/\/doi.org\/10.1109\/ACCESS.2020.3017221."},{"key":"3064_CR14","doi-asserted-by":"publisher","first-page":"120331","DOI":"10.1109\/ACCESS.2020.3006358","volume":"8","author":"B Liao","year":"2020","unstructured":"Liao, B., Ali, Y., Nazir, S., He, L., & Khan, H. U. (2020). \u201cSecurity Analysis of IoT Devices by Using Mobile Computing. A Systematic Literature Review \" IEEE Access, 8, 120331\u2013120350. doi: https:\/\/doi.org\/10.1109\/ACCESS.2020.3006358","journal-title":"A Systematic Literature Review \" IEEE Access"},{"key":"3064_CR15","doi-asserted-by":"crossref","unstructured":"Li, C., Yuan, C., & Zhong, Y. (2009). \u201cLayered encryption for scalable video coding.\u201c. 2009 2nd International Congress on Image and Signal Processing (pp. 1\u20134). IEEE","DOI":"10.1109\/CISP.2009.5302934"},{"key":"3064_CR16","unstructured":"http:\/\/www.itl.nist.gov\/fipspubs\/fip81.htm"},{"issue":"8","key":"3064_CR17","doi-asserted-by":"publisher","first-page":"5829","DOI":"10.1109\/TII.2020.3043802","volume":"17","author":"MA Jan","year":"2020","unstructured":"Jan, M. A., Khan, F., Khan, R., Mastorakis, S., Menon, V. G., Alazab, M., & Watters, P. (2020). Lightweight mutual authentication and privacy-preservation scheme for intelligent wearable devices in industrial-CPS. IEEE Transactions on Industrial Informatics, 17(8), 5829\u20135839","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"3064_CR18","doi-asserted-by":"crossref","unstructured":"Lalithambigai, B., & Chitra, S. (2022). A hybrid adaptive block based compressive sensing in video for IoMT applications. Wireless Networks, pp.1\u201310","DOI":"10.1007\/s11276-021-02847-0"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03064-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03064-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03064-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T17:14:37Z","timestamp":1673025277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03064-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,17]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["3064"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03064-z","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,17]]},"assertion":[{"value":"16 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}