{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:31:26Z","timestamp":1769743886278,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T00:00:00Z","timestamp":1734652800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T00:00:00Z","timestamp":1734652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-024-00217-1","type":"journal-article","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T06:37:19Z","timestamp":1734676639000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Construction of embedded online teaching platform based on AES-RSA encryption algorithm"],"prefix":"10.1007","volume":"4","author":[{"given":"Xiaojing","family":"Kong","sequence":"first","affiliation":[]},{"given":"Guanli","family":"Yue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,20]]},"reference":[{"issue":"9","key":"217_CR1","doi-asserted-by":"publisher","first-page":"2940","DOI":"10.1021\/acs.jchemed.0c00642","volume":"97","author":"C Xiao","year":"2020","unstructured":"Xiao C, Cai H, Su Y, Shen L. Online teaching practices and strategies for inorganic chemistry using a combined platform based on DingTalk, learning@ ZJU, and wechat. J Chem Educ. 2020;97(9):2940\u20134. https:\/\/doi.org\/10.1021\/acs.jchemed.0c00642.","journal-title":"J Chem Educ"},{"issue":"4","key":"217_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1080\/17408989.2023.2232802","volume":"7","author":"A Ha","year":"2023","unstructured":"Ha A, Chan C, Lander N. Critical contextual factors of sustainable online teaching: learning the lessons of pandemic times from physical education teachers\u2019 and school administrators\u2019 perspectives. Phys Educ Sport Peda. 2023;7(4):213\u201323. https:\/\/doi.org\/10.1080\/17408989.2023.2232802.","journal-title":"Phys Educ Sport Peda"},{"issue":"3","key":"217_CR3","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1080\/15391523.2022.2139026","volume":"56","author":"S Luo","year":"2024","unstructured":"Luo S, Zou D. A systematic review of research on technological, pedagogical, and content knowledge (TPACK) for online teaching in the humanities. J Res Technol Educ. 2024;56(3):332\u201346. https:\/\/doi.org\/10.1080\/15391523.2022.2139026.","journal-title":"J Res Technol Educ"},{"issue":"1","key":"217_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/s12596-023-01232-8","volume":"8","author":"AHH Brahim","year":"2023","unstructured":"Brahim AHH, Pacha AA, Said NH. An image encryption scheme based on a modified AES algorithm by using a variable S-box. J Opt. 2023;8(1):122\u201334. https:\/\/doi.org\/10.1007\/s12596-023-01232-8.","journal-title":"J Opt"},{"issue":"11","key":"217_CR5","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/RAEECS50817.2020.9265688","volume":"4","author":"J Pirzada","year":"2020","unstructured":"Pirzada J, Xu T, Liu J. High-throughput optimizations for AES algorithm and its implementation on FPGA for satellite networks. IET Circ Device Syst. 2020;4(11):221\u201331. https:\/\/doi.org\/10.1109\/RAEECS50817.2020.9265688.","journal-title":"IET Circ Device Syst"},{"issue":"4","key":"217_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/JSSC.2021.3052146","volume":"56","author":"R Kumar","year":"2021","unstructured":"Kumar R, Liu X, Suresh V, Krishnamurthy HK, Mathew SK. A time-frequency-domain side-channel attack resistant AES-128 and RSA-4K crypto-processor in 14-nm CMOS. IEEE J Solid-St Circ. 2021;56(4):13\u201321. https:\/\/doi.org\/10.1109\/JSSC.2021.3052146.","journal-title":"IEEE J Solid-St Circ"},{"issue":"9","key":"217_CR7","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.ijleo.2021.167779","volume":"8","author":"M Shariatzadeh","year":"2021","unstructured":"Shariatzadeh M, Rostami MJ, Eftekhari M. Proposing a novel dynamic AES for image encryption using a chaotic map key management approach. Optik. 2021;8(9):544\u201356. https:\/\/doi.org\/10.1016\/j.ijleo.2021.167779.","journal-title":"Optik"},{"issue":"9","key":"217_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TVT.2021.3082308","volume":"3","author":"G Raja","year":"2021","unstructured":"Raja G, Anbalagan S, Subramaniyan AG, Selvakumar MS, Mumtaz S. Efficient and secured swarm pattern multi-UAV communication. IEEE T Veh Technol. 2021;3(9):123\u201332. https:\/\/doi.org\/10.1109\/TVT.2021.3082308.","journal-title":"IEEE T Veh Technol"},{"issue":"5","key":"217_CR9","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/TC.2021.3050515","volume":"5","author":"P Choi","year":"2021","unstructured":"Choi P, Kong W, Kim JH, Lee MK, Kim DK. Architectural supports for block ciphers in a RISC CPU core by instruction overloading. IEEE T Comput. 2021;5(5):234\u201342. https:\/\/doi.org\/10.1109\/TC.2021.3050515.","journal-title":"IEEE T Comput"},{"issue":"5","key":"217_CR10","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/JSSC.2021.3113335","volume":"9","author":"A Ghosh","year":"2022","unstructured":"Ghosh A, Das D, Danial J, De V, Ghosh S, Sen S. Syn-STELLAR: an EM\/power SCA-resilient AES-256 with synthesis-friendly signature attenuation. IEEE J Solid-St Circ. 2022;9(5):675\u201386. https:\/\/doi.org\/10.1109\/JSSC.2021.3113335.","journal-title":"IEEE J Solid-St Circ"},{"issue":"4","key":"217_CR11","doi-asserted-by":"publisher","first-page":"781","DOI":"10.21203\/rs.3.rs-141388\/v1","volume":"7","author":"M Shahnama","year":"2021","unstructured":"Shahnama M, Shirvan ME. Challenges of online teaching during the COVID-19 pandemic in an english as a foreign language context: a process tracing approach. TESL Quart. 2021;7(4):781\u201392. https:\/\/doi.org\/10.21203\/rs.3.rs-141388\/v1.","journal-title":"TESL Quart."},{"issue":"3","key":"217_CR12","doi-asserted-by":"publisher","first-page":"537","DOI":"10.13052\/jcsm2245-1439.1033","volume":"10","author":"S Kumar","year":"2021","unstructured":"Kumar S, Kumar D, Lamkuche HS. TPA auditing to enhance the privacy and security in cloud systems. J Cyber Sec Mob. 2021;10(3):537\u201368. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1033.","journal-title":"J Cyber Sec Mob"},{"issue":"3","key":"217_CR13","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/j.ijmedinf.2023.105066","volume":"175","author":"J Alipour","year":"2023","unstructured":"Alipour J, Mehdipour Y, Karimi A, Khorashadizadeh M, Akbarpour M. Security, confidentiality, privacy and patient safety in the hospital information systems from the user\u2019s perspective: a cross-sectional study. Int J Med Inform. 2023;175(3):765\u201378. https:\/\/doi.org\/10.1016\/j.ijmedinf.2023.105066.","journal-title":"Int J Med Inform"},{"issue":"7","key":"217_CR14","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.ins.2020.07.023","volume":"543","author":"X Yang","year":"2021","unstructured":"Yang X, Yi X, Kelarev A, Han F, Luo J. A distributed networked system for secure publicly verifiable self-tallying online voting. Inform Sci. 2021;543(7):125\u201342. https:\/\/doi.org\/10.1016\/j.ins.2020.07.023.","journal-title":"Inform Sci"},{"issue":"2","key":"217_CR15","doi-asserted-by":"publisher","first-page":"363","DOI":"10.13052\/jmm1550-4646.1921","volume":"19","author":"S Kumar","year":"2022","unstructured":"Kumar S, Kumar D. Securing of cloud storage data using hybrid AES-ECC cryptographic approach. J Mob Multimed. 2022;19(2):363\u201388. https:\/\/doi.org\/10.13052\/jmm1550-4646.1921.","journal-title":"J Mob Multimed"},{"issue":"8","key":"217_CR16","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1542\/peds.2023-061213","volume":"7","author":"B Sisk","year":"2023","unstructured":"Sisk B, Antes AL, Bereitschaft C, Enloe M, Bourgeois F, Dubois J. Challenges to developing and implementing policies for adolescent online portal access. Pediatrics. 2023;7(8):765\u201378. https:\/\/doi.org\/10.1542\/peds.2023-061213.","journal-title":"Pediatrics"},{"issue":"17","key":"217_CR17","doi-asserted-by":"publisher","first-page":"26661","DOI":"10.1007\/s11042-023-15038-0","volume":"82","author":"S Kumar","year":"2023","unstructured":"Kumar S, Kumar D, Singh N. Performance and security analysis using B-128 modified blowfish algorithm. Multimed Tools Appl. 2023;82(17):26661\u201378. https:\/\/doi.org\/10.1007\/s11042-023-15038-0.","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"217_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1111\/1467-9566.13408","volume":"44","author":"RR Lee","year":"2022","unstructured":"Lee RR, Peters S, Mcdonagh JE, Farre A, Cordingley L, Rapley T. Data protection, information governance and the potential erosion of ethnographic methods in health care? Sociol Health Ill. 2022;44(1):211\u20137. https:\/\/doi.org\/10.1111\/1467-9566.13408.","journal-title":"Sociol Health Ill"},{"issue":"1","key":"217_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.32604\/cmc.2023.047084","volume":"78","author":"S Kumar","year":"2024","unstructured":"Kumar S, Kumar D, Dangi R, Choudhary G, Dragoni N, You I. A review of lightweight security and privacy for resource-constrained IoT devices. CMC. 2024;78(1):31\u201363. https:\/\/doi.org\/10.32604\/cmc.2023.047084.","journal-title":"CMC"},{"issue":"2","key":"217_CR20","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1021\/acsphotonics.3c01519","volume":"11","author":"Z Wang","year":"2024","unstructured":"Wang Z, Niu M, Zhao W, Wang Z, Wan S, Shi Y, Li Z. Compression-encrypted meta-optics for storage efficiency and security enhancement. ACS Photonics. 2024;11(2):688\u201395. https:\/\/doi.org\/10.1021\/acsphotonics.3c01519.","journal-title":"ACS Photonics"},{"issue":"1","key":"217_CR21","doi-asserted-by":"publisher","first-page":"101914","DOI":"10.1016\/j.jksuci.2024.101914","volume":"36","author":"L Qu","year":"2024","unstructured":"Qu L, Li M, Sun Y, Su S, Liu Y, Zhang L. Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer. J King Saud Univ Com. 2024;36(1):101914\u201326. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101914.","journal-title":"J King Saud Univ Com"},{"issue":"8","key":"217_CR22","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1007\/s11036-023-02196-6","volume":"38","author":"H Cao","year":"2023","unstructured":"Cao H, Srivastava G. An encryption transmission system for high-speed private data streams in online education in the specialty of \u201ctraffic engineering.\u201d Mobile Netw Appl. 2023;38(8):1007\u201318. https:\/\/doi.org\/10.1007\/s11036-023-02196-6.","journal-title":"Mobile Netw Appl"},{"issue":"1","key":"217_CR23","doi-asserted-by":"publisher","first-page":"74","DOI":"10.3390\/app12010074","volume":"12","author":"MY Alshahrani","year":"2021","unstructured":"Alshahrani MY. Implementation of a blockchain system using improved elliptic curve cryptography algorithm for the performance assessment of the students in the e-learning platform. Appl Sci-Basel. 2021;12(1):74\u201387. https:\/\/doi.org\/10.3390\/app12010074.","journal-title":"Appl Sci-Basel"},{"issue":"4","key":"217_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.6703\/IJASE.202106_18(4).003","volume":"18","author":"JP Sermeno","year":"2021","unstructured":"Sermeno JP, Secugal KAS, Mistio NE. Modified Vigenere cryptosystem: an integrated data encryption module for learning management system. Int J Appl Sci Eng. 2021;18(4):1\u201310. https:\/\/doi.org\/10.6703\/IJASE.202106_18(4).003.","journal-title":"Int J Appl Sci Eng"},{"issue":"14","key":"217_CR25","doi-asserted-by":"publisher","first-page":"8293","DOI":"10.6703\/IJASE.202106_18(4).003","volume":"13","author":"J Yin","year":"2023","unstructured":"Yin J, Cui J. Secure application of MIoT: privacy-preserving solution for online english education platforms. Appl Sci Basel. 2023;13(14):8293\u2013310. https:\/\/doi.org\/10.6703\/IJASE.202106_18(4).003.","journal-title":"Appl Sci Basel"},{"issue":"5","key":"217_CR26","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1177\/0957926520914686","volume":"31","author":"S Horrod","year":"2020","unstructured":"Horrod S. \u2018Embedded into the core\u2019: the discursive construction of \u2018policy\u2019 in higher education learning and teaching documents and its recontextualization in practices. Discourse Soc. 2020;31(5):478\u201397. https:\/\/doi.org\/10.1177\/0957926520914686.","journal-title":"Discourse Soc"},{"issue":"9","key":"217_CR27","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/TIA.2020.3034290","volume":"2","author":"S Wen","year":"2020","unstructured":"Wen S, Zhao T, Tang Y, Xu Y, Ding Z. Coordinated optimal energy management and voyage scheduling for all-electric ships based on predicted shore-side electricity price. IEEE T Ind Appl. 2020;2(9):544\u201367. https:\/\/doi.org\/10.1109\/TIA.2020.3034290.","journal-title":"IEEE T Ind Appl"},{"issue":"5","key":"217_CR28","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1111\/bjet.13113","volume":"9","author":"B Fox","year":"2021","unstructured":"Fox B, Bearman M, Bellingham R, North-Samardzic A, Volkov M. Longing for connection: university educators creating meaning through sharing experiences of teaching online. Brit J Educ Technol. 2021;9(5):652\u201364. https:\/\/doi.org\/10.1111\/bjet.13113.","journal-title":"Brit J Educ Technol"},{"issue":"21","key":"217_CR29","doi-asserted-by":"publisher","first-page":"3702","DOI":"10.1016\/j.vaccine.2020.04.007","volume":"38","author":"JH Kim","year":"2020","unstructured":"Kim JH, Lee H, Shin JY. Bacillus Calmette-Gu\u00e9rin (BCG) vaccine safety surveillance in the Korea adverse event reporting system using the tree-based scan statistic and conventional disproportionality-based algorithms. Vaccine. 2020;38(21):3702\u201310. https:\/\/doi.org\/10.1016\/j.vaccine.2020.04.007.","journal-title":"Vaccine"},{"issue":"3","key":"217_CR30","doi-asserted-by":"publisher","first-page":"179","DOI":"10.47852\/bonviewAIA3202624","volume":"1","author":"C Hebbi","year":"2023","unstructured":"Hebbi C, Mamatha H. Comprehensive dataset building and recognition of isolated handwritten Kannada characters using machine learning models. Artif Intell Appl. 2023;1(3):179\u201390. https:\/\/doi.org\/10.47852\/bonviewAIA3202624.","journal-title":"Artif Intell Appl"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-024-00217-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-024-00217-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-024-00217-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T07:09:07Z","timestamp":1734678547000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-024-00217-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,20]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["217"],"URL":"https:\/\/doi.org\/10.1007\/s44163-024-00217-1","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,20]]},"assertion":[{"value":"28 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"114"}}