{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:38Z","timestamp":1750220558096,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,28]]},"DOI":"10.1145\/3469213.3470404","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T04:19:21Z","timestamp":1629346761000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of application evaluation platform for cryptography in IoT system"],"prefix":"10.1145","author":[{"given":"Kai","family":"Liu","sequence":"first","affiliation":[{"name":"Beijing Chuangyuan Tiandi Technology Co., Ltd, China"}]},{"given":"Qinghai","family":"Xiao","sequence":"additional","affiliation":[{"name":"Beijing Chuangyuan Tiandi Technology Co., Ltd, China"}]},{"given":"Lijun","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Chuangyuan Tiandi Technology Co., Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"#cr-split#-e_1_3_2_1_1_1.1","doi-asserted-by":"crossref","unstructured":"Arul P and Renuka S.\"Blockchain technology using consensus mechanism for IoT-based e-healthcare system.\"\u00a0IOP Conference Series: Materials Science and Engineering\u00a01055.1(2021):. doi:10.1088\/1757-899X\/1055\/1\/012106. 10.1088\/1757-899X","DOI":"10.1088\/1757-899X\/1055\/1\/012106"},{"key":"#cr-split#-e_1_3_2_1_1_1.2","doi-asserted-by":"crossref","unstructured":"Arul P and Renuka S.\"Blockchain technology using consensus mechanism for IoT-based e-healthcare system.\"\u00a0IOP Conference Series: Materials Science and Engineering\u00a01055.1(2021):. doi:10.1088\/1757-899X\/1055\/1\/012106.","DOI":"10.1088\/1757-899X\/1055\/1\/012106"},{"key":"e_1_3_2_1_2_1","volume-title":"Commercial cryptography application and security evaluation[M]","author":"Huo Wei","year":"2020","unstructured":"Wei Huo , Qiquan Guo , Yuan Ma . Commercial cryptography application and security evaluation[M] . Publishing House of Electronics Industry : Beijing , 2020 : 159-163. Wei Huo, Qiquan Guo, Yuan Ma. Commercial cryptography application and security evaluation[M]. Publishing House of Electronics Industry: Beijing, 2020: 159-163."},{"key":"e_1_3_2_1_3_1","unstructured":"Liangmin Wang Tingting Li and Long Chen. \"The structure and security of vehicle networking based on vehicle identity.\" Journal of Network and Information Security 2.02(2016): 41-54.  Liangmin Wang Tingting Li and Long Chen. \"The structure and security of vehicle networking based on vehicle identity.\" Journal of Network and Information Security 2.02(2016): 41-54."},{"key":"e_1_3_2_1_4_1","first-page":"97","volume":"09","author":"Feng Kai","year":"2019","unstructured":"Kai Feng , Wei Li , and Jiezhong Gong . \" Analysis of the Status Quo of the Application of Cryptographic Algorithms in the Internet of Vehicles .\" China Information Security . 09 ( 2019 ): 97 - 99 . Kai Feng, Wei Li, and Jiezhong Gong. \"Analysis of the Status Quo of the Application of Cryptographic Algorithms in the Internet of Vehicles.\" China Information Security .09(2019):97-99.","journal-title":"China Information Security"},{"key":"e_1_3_2_1_5_1","first-page":"46","volume":"08","author":"Xu Xiu","year":"2020","unstructured":"Xiu Xu , \" Research on the Cipher Application System of Internet of Vehicles .\" Information and Communication Technology and Policy . 08 ( 2020 ): 46 - 51 . Xiu Xu, \"Research on the Cipher Application System of Internet of Vehicles.\" Information and Communication Technology and Policy .08(2020):46-51.","journal-title":"Information and Communication Technology and Policy"},{"key":"e_1_3_2_1_6_1","first-page":"86","volume":"04","author":"Liu Cai Yun","year":"2019","unstructured":"Cai Yun Liu , Xue Hong Chen , and Shuai Feng Yang . \" The combination of domestic cryptographic algorithms and industrial Internet platforms is imperative.\" China Information Security . 04 ( 2019 ): 86 - 89 . Cai Yun Liu, Xue Hong Chen, and Shuai Feng Yang. \"The combination of domestic cryptographic algorithms and industrial Internet platforms is imperative.\" China Information Security .04(2019):86-89.","journal-title":"China Information Security"},{"key":"e_1_3_2_1_7_1","first-page":"75","volume":"04","author":"He Xiaolong","year":"2020","unstructured":"Xiaolong He , \" Research on Data Protection of Industrial Internet Platforms under the Background of \" Cryptography Law\".\" China Information Security . 04 ( 2020 ): 75 - 77 . Xiaolong He, \"Research on Data Protection of Industrial Internet Platforms under the Background of \"Cryptography Law\".\" China Information Security .04(2020):75-77.","journal-title":"China Information Security"},{"key":"e_1_3_2_1_8_1","first-page":"48","volume-title":"Proceedings of the 2019 China Network Security Level Protection and Critical Information Infrastructure Protection Conference. Ed..","author":"Shuilin","year":"2019","unstructured":"Shuilin li, \" Research on the Application of Commercial Cryptography in Government Websites\". Proceedings of the 2019 China Network Security Level Protection and Critical Information Infrastructure Protection Conference. Ed.. , 2019 , 48 - 51 . Shuilin li, \"Research on the Application of Commercial Cryptography in Government Websites\". Proceedings of the 2019 China Network Security Level Protection and Critical Information Infrastructure Protection Conference. Ed.., 2019, 48-51."},{"key":"e_1_3_2_1_9_1","volume-title":"Research on the use and management of commercial passwords in social service-oriented government information systems","author":"Shi Yafei","year":"2019","unstructured":"Yafei Shi . Research on the use and management of commercial passwords in social service-oriented government information systems . 2019 . Inner Mongolia University , MA thesis. Yafei Shi. Research on the use and management of commercial passwords in social service-oriented government information systems. 2019. Inner Mongolia University, MA thesis."},{"key":"e_1_3_2_1_10_1","first-page":"166","volume":"22","author":"Feng Wei","year":"2020","unstructured":"Wei Feng . \" On the application of commercial cryptography in the power industry.\" Electronic World . 22 ( 2020 ): 166 - 167 . Wei Feng. \"On the application of commercial cryptography in the power industry.\" Electronic World .22(2020):166-167.","journal-title":"Electronic World"},{"key":"e_1_3_2_1_11_1","unstructured":"Xiaoyan Wei and Fang Ji. \"The Application of Commercial Code in Railways.\" Railway Computer Application 22.08(2013):43-45+49.  Xiaoyan Wei and Fang Ji. \"The Application of Commercial Code in Railways.\" Railway Computer Application 22.08(2013):43-45+49."},{"key":"#cr-split#-e_1_3_2_1_12_1.1","unstructured":"Jia Zhuang \"Q_Value detection: a new random number statistical detection method.\" Journal of Cryptography 3.02(2016):192-201. doi:10.13868\/j.cnki.jcr.000120. 10.13868\/j.cnki.jcr.000120"},{"key":"#cr-split#-e_1_3_2_1_12_1.2","unstructured":"Jia Zhuang \"Q_Value detection: a new random number statistical detection method.\" Journal of Cryptography 3.02(2016):192-201. doi:10.13868\/j.cnki.jcr.000120."},{"key":"e_1_3_2_1_13_1","volume-title":"Network Security-Technology and Practice","author":"Liu Jianwei","year":"2018","unstructured":"Jianwei Liu , Yumin Wang . Network Security-Technology and Practice ( 3 rd Edition)[M]. Tsinghua University Press : Beijing , 2018 : 239-245. Jianwei Liu, Yumin Wang. Network Security-Technology and Practice (3rd Edition)[M]. Tsinghua University Press: Beijing, 2018: 239-245.","edition":"3"},{"key":"e_1_3_2_1_14_1","volume-title":"Secured Message Data Transactions with a Digital Envelope (DE)-A Higher Level Cryptographic Technique[C]\/\/ International Conference on Engineering Research, Innovation and Education","author":"Rashed M G","year":"2013","unstructured":"Rashed M G , Ullah S E , Yasmin R . Secured Message Data Transactions with a Digital Envelope (DE)-A Higher Level Cryptographic Technique[C]\/\/ International Conference on Engineering Research, Innovation and Education 2013 . 2013. Rashed M G , Ullah S E , Yasmin R . Secured Message Data Transactions with a Digital Envelope (DE)-A Higher Level Cryptographic Technique[C]\/\/ International Conference on Engineering Research, Innovation and Education 2013. 2013."}],"event":{"name":"ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems","acronym":"ICAIIS 2021","location":"Chongqing China"},"container-title":["2021 2nd International Conference on Artificial Intelligence and Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469213.3470404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3469213.3470404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:27Z","timestamp":1750195707000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469213.3470404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":16,"alternative-id":["10.1145\/3469213.3470404","10.1145\/3469213"],"URL":"https:\/\/doi.org\/10.1145\/3469213.3470404","relation":{},"subject":[],"published":{"date-parts":[[2021,5,28]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}