{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:41:17Z","timestamp":1730234477881,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1109\/icceic60201.2023.10426693","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:35:26Z","timestamp":1707867326000},"page":"312-316","source":"Crossref","is-referenced-by-count":0,"title":["Research on Real-Time Video Stream Authentication Based on SM2 in H.264"],"prefix":"10.1109","author":[{"given":"Xiaohui","family":"Li","sequence":"first","affiliation":[{"name":"Zhongyuan University of Technology The Frontier Information Technology Research Institute,Zhengzhou,China"}]},{"given":"Zhe","family":"Yu","sequence":"additional","affiliation":[{"name":"Zhongyuan University of Technology The Frontier Information Technology Research Institute,Zhengzhou,China"}]},{"given":"Lin","family":"Han","sequence":"additional","affiliation":[{"name":"Zhongyuan University of Technology The Frontier Information Technology Research Institute,Zhengzhou,China"}]},{"given":"Qiushi","family":"Yao","sequence":"additional","affiliation":[{"name":"Zhongyuan University of Technology The Frontier Information Technology Research Institute,Zhengzhou,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"177","article-title":"Design of Secure Video Stream Transmission System Based on Gstreamer","volume":"26","author":"Jian","year":"2016","journal-title":"Computer Technology and Development"},{"key":"ref2","first-page":"154","article-title":"Design and Implementation of a Secure Transfering System for Video-Streaming","volume":"20","author":"Shi","year":"2010","journal-title":"Computer Technology and Development"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2010.12.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2672-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2011.04.008"},{"volume-title":"Information Security Technology SM2 Elliptic Curve Public Key CryptogA Tahic Algorithm Part 4: Public Key Cryptographic Algorithm","year":"2016","key":"ref6"},{"key":"ref7","first-page":"805","article-title":"Research on Safety Certification Method of Intelligent Connected Vehicle Based on Algorithm SM2","volume":"40","author":"Li","year":"2022","journal-title":"Journal of Jilin University (Information Science Edition)"},{"key":"ref8","first-page":"2811","article-title":"Security Analysis and Protection of SM2 Algorithm Software Implementation","volume":"38","author":"Wang","year":"2021","journal-title":"Application Research of Computers"},{"key":"ref9","first-page":"4274","article-title":"A High Throughput SM2 Digital Signature Computing Scheme Based on Graphics Processing Unit Platform","volume":"44","author":"Zhu","year":"2022","journal-title":"Journal of Electronics & Information Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2016.070949"},{"key":"ref11","first-page":"96","article-title":"Implementation of Public Key Cryptographic Algorithm SM2 based on C language","volume":"19","author":"Xing","year":"2017","journal-title":"China New Telecommunications"}],"event":{"name":"2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","start":{"date-parts":[[2023,10,20]]},"location":"Guangzhou, China","end":{"date-parts":[[2023,10,22]]}},"container-title":["2023 4th International Conference on Computer Engineering and Intelligent Control (ICCEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10424971\/10426625\/10426693.pdf?arnumber=10426693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:01:13Z","timestamp":1710403273000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10426693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icceic60201.2023.10426693","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]}}}