{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:14:15Z","timestamp":1751516055701,"version":"3.41.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cisp-bmei.2017.8301930","type":"proceedings-article","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T21:16:30Z","timestamp":1520630190000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Security mechanism of video content integrated broadcast control platform under triple play"],"prefix":"10.1109","author":[{"given":"Peng","family":"Yu","sequence":"first","affiliation":[]},{"given":"Nenghuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shengyan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"126","article-title":"and efficient protocol for secure two-party comparing under semi-honest model","volume":"46","author":"fair","year":"2010","journal-title":"Computer Engineering & Applications"},{"key":"ref11","first-page":"110","article-title":"Video content confidentiality comparsion scheme based on EIGamal system","volume":"40","author":"peng","year":"2014","journal-title":"Computer Engineering"},{"key":"ref12","first-page":"305","volume":"39","author":"li","year":"2009","journal-title":"Two sets of equal multi-party secure computations"},{"key":"ref13","first-page":"63","article-title":"Computationally secure bit commitment protocol based on quantum steganography","volume":"29","author":"dong","year":"2012","journal-title":"Chinese Journal of Quantum Electronics"},{"key":"ref14","first-page":"19","article-title":"Integration and broadcasting platform and technologies in Tri-Network convergence","volume":"4","author":"zhang","year":"2011","journal-title":"ZTE Technology Journal"},{"key":"ref4","first-page":"91","article-title":"Digital video forgeries eetection based on textural features","volume":"21","author":"yuan","year":"2012","journal-title":"Computer Systems & Applications"},{"key":"ref3","first-page":"1","article-title":"Present status and development of network convergence","volume":"33","author":"yuan","year":"2010","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008911"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.11834\/jig.20100802","article-title":"Invertible semi-fragile video watermarking algorithm used for content authentication","volume":"15","author":"zeng","year":"2010","journal-title":"Journal of Image and Graphics"},{"key":"ref8","first-page":"20","article-title":"Video security responsibilities identified method based on Bit Commitment","volume":"11","author":"peng","year":"2014","journal-title":"Video Engineering"},{"key":"ref7","first-page":"1049","article-title":"Three-Party Bit Commitment based on elliptic curve","volume":"31","author":"yang","year":"2009","journal-title":"Journal of Electronics & Information Technology"},{"key":"ref2","first-page":"316","article-title":"The security sssues in triple-play","volume":"3","author":"wu","year":"2011","journal-title":"Bulletin of Chinese Academy of Sciences"},{"key":"ref1","first-page":"18","article-title":"Empirical research on information security technology in triple play environment","volume":"1","author":"wang","year":"2017","journal-title":"Journal of Network Security Technology&Application"},{"key":"ref9","first-page":"168","article-title":"Digital signature and encrypt algorithm based on elliptic curve","volume":"37","author":"xu","year":"2011","journal-title":"Computer Engineering"}],"event":{"name":"2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","start":{"date-parts":[[2017,10,14]]},"location":"Shanghai","end":{"date-parts":[[2017,10,16]]}},"container-title":["2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8293044\/8301897\/08301930.pdf?arnumber=8301930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T17:29:16Z","timestamp":1751477356000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8301930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cisp-bmei.2017.8301930","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}