{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:13:27Z","timestamp":1740100407842,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51875457"],"award-info":[{"award-number":["51875457"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["2018JM6120,2019JM-606"],"award-info":[{"award-number":["2018JM6120,2019JM-606"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,14]]},"DOI":"10.1109\/iccais52680.2021.9624641","type":"proceedings-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T21:21:26Z","timestamp":1639084886000},"page":"504-508","source":"Crossref","is-referenced-by-count":1,"title":["Research on Data Encryption in Lightweight Embedded Web Server"],"prefix":"10.1109","author":[{"given":"PengFei","family":"Li","sequence":"first","affiliation":[]},{"given":"Junsuo","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Haonan","family":"Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Server Program Analysis Based on HTTP Protocol [J]","volume":"63","author":"min","year":"0","journal-title":"MATEC Web of Conferences"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0175500"},{"key":"ref12","first-page":"64","article-title":"The Secret of HTTP Protocol [J \/ OL]","volume":"43","author":"han","year":"2017","journal-title":"Computer Networks"},{"key":"ref13","first-page":"68","article-title":"Design of wireless control circuit based on ESP8266 [J \/ OL]","volume":"30","author":"zhenmin","year":"2017","journal-title":"Industrial Control Computer"},{"key":"ref14","first-page":"395","article-title":"Encryption algorithm of elliptic curve lattice group on finite field GF (2 ~ 8) based on normal basis representation [J \/ OL]","volume":"41","author":"haifeng","year":"2018","journal-title":"Journal of Wuhan University of Science and Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546570"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44499-8_8"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"ref17"},{"key":"ref18","first-page":"95","article-title":"Remote environment real-time monitoring system based on STM32[J]","volume":"25","author":"jian","year":"2020","journal-title":"Journal of Xi'an University of Posts and Telecommunications"},{"key":"ref19","first-page":"305","article-title":"Architecture design of mobile network intercom system based on MQTT protocol[J]","volume":"21","author":"yi","year":"2014","journal-title":"Computer CD-ROM Software and Application"},{"key":"ref4","first-page":"35","article-title":"Analysis and application research of ECC encryption algorithm [J\/OL]","volume":"12","author":"mengting","year":"2018","journal-title":"Network security technology and application"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2825449"},{"key":"ref6","first-page":"11","article-title":"Research and Implementation of Embedded Web Remote Monitoring System Based on B \/ S Architecture [J \/ OL]","volume":"13","author":"chao","year":"2015","journal-title":"Science and technology News"},{"key":"ref5","first-page":"679","article-title":"An effective Web fingerprint recognition method [J]","volume":"33","author":"shujun","year":"2016","journal-title":"Journal of the university of Chinese academy of sciences"},{"key":"ref8","first-page":"36","article-title":"Thorough Research on Application of Embedded Web server in Video Surveillance System [J \/ OL]","volume":"26","author":"wei","year":"2007","journal-title":"Microcomputer Information"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2018.04.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0386-0"},{"key":"ref1","first-page":"209","article-title":"Design and Application of Embedded Web Server [J \/ OL]","volume":"2","author":"xiangyang","year":"2017","journal-title":"Electronic Technology and Software Engineering"},{"key":"ref9","first-page":"37","article-title":"Computer network forensics research based on HTTP protocol message analysis [J \/ OL]","volume":"26","author":"lulu","year":"2018","journal-title":"Electronic Design Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2015.7281913"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947775"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947775"}],"event":{"name":"2021 International Conference on Control, Automation and Information Sciences (ICCAIS)","start":{"date-parts":[[2021,10,14]]},"location":"Xi'an, China","end":{"date-parts":[[2021,10,17]]}},"container-title":["2021 International Conference on Control, Automation and Information Sciences (ICCAIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624464\/9624202\/09624641.pdf?arnumber=9624641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:46Z","timestamp":1652201626000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,14]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iccais52680.2021.9624641","relation":{},"subject":[],"published":{"date-parts":[[2021,10,14]]}}}