{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:37Z","timestamp":1750220317123,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T00:00:00Z","timestamp":1640131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,22]]},"DOI":"10.1145\/3512576.3512628","type":"proceedings-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T16:22:04Z","timestamp":1649694124000},"page":"288-291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Digital fingerprint extraction method of IOT devices based on Cryptography"],"prefix":"10.1145","author":[{"given":"Yan jie","family":"Zhang","sequence":"first","affiliation":[{"name":"Smart-Chip Microelectronics Technology Co.,Ltd., State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, China"}]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Smart-Chip Microelectronics Technology Co.,Ltd., State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, China"}]},{"given":"Feng","family":"Yang","sequence":"additional","affiliation":[{"name":"Smart-Chip Microelectronics Technology Co.,Ltd., State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, China"}]},{"given":"Siting","family":"Gu","sequence":"additional","affiliation":[{"name":"Smart-Chip Microelectronics Technology Co.,Ltd., State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"HU Xiang-dong Wei Qin-fang Hu Rong.Applied cryptography(4 version).Beijing:Publishing House of Electronics Industry 2019:378-379  HU Xiang-dong Wei Qin-fang Hu Rong.Applied cryptography(4 version).Beijing:Publishing House of Electronics Industry 2019:378-379"},{"key":"e_1_3_2_1_2_1","volume-title":"Internet of Things Security Course","author":"Kai ZHANG","year":"2014","unstructured":"ZHANG Kai . Internet of Things Security Course . Beijing : Tsinghua university press , 2014 :315-320 ZHANG Kai. Internet of Things Security Course. Beijing:Tsinghua university press,2014:315-320"},{"key":"e_1_3_2_1_3_1","unstructured":"WANG Zeng-guang CHEN Li-yun LU Yu.Research on WiFi Identity Authentication Scheme Based on Dynamic Password Microelectronics&Computer 2016 33(6): 78-81  WANG Zeng-guang CHEN Li-yun LU Yu.Research on WiFi Identity Authentication Scheme Based on Dynamic Password Microelectronics&Computer 2016 33(6): 78-81"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"148","article-title":"of embedded network communications based on hardware encryption","volume":"36","author":"SONG","year":"2010","unstructured":"SONG Guang-jie, ZHANG Ming-hui, LI Jing-jiao. Research of embedded network communications based on hardware encryption , Application of Electronic Technique , 2010 , 36 ( 1 ): 148 - 150 . SONG Guang-jie,ZHANG Ming-hui,LI Jing-jiao.Research of embedded network communications based on hardware encryption,Application of Electronic Technique, 2010,36(1):148-150.","journal-title":"Application of Electronic Technique"},{"key":"e_1_3_2_1_5_1","unstructured":"FENG L.Research and Design of Remote Identity Authentication on System Based on Bio-metrics and PKI Technology Jinan:Shandong University 2019.  FENG L.Research and Design of Remote Identity Authentication on System Based on Bio-metrics and PKI Technology Jinan:Shandong University 2019."},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"88","article-title":"S2M","volume":"4","author":"Da-Jang CHEN","year":"2016","unstructured":"CHEN Da-Jang , ZHANG Ning , QIN Zhen , S2M : A Lightweight Acoustic Fingerprints-based Wireless Device Authentication Protocol.IEEE Internet of Things Journal , 2016 , 4 ( 1 ): 88 - 100 . CHEN Da-Jang, ZHANG Ning, QIN Zhen,et al.S2M:A Lightweight Acoustic Fingerprints-based Wireless Device Authentication Protocol.IEEE Internet of Things Journal, 2016, 4(1): 88-100.","journal-title":"A Lightweight Acoustic Fingerprints-based Wireless Device Authentication Protocol.IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_7_1","unstructured":"FANG Y Y.Research and Implementation about Device Fingerprints based on Smartphone's Battery Wuhan:Wuhan University 2018..  FANG Y Y.Research and Implementation about Device Fingerprints based on Smartphone's Battery Wuhan:Wuhan University 2018.."},{"key":"e_1_3_2_1_8_1","unstructured":"Guo L B.Design and implementation of identity authentication and license authorization system based on machine fingerprint Chengdu:University of Electronic Science and Technology of China 2011.  Guo L B.Design and implementation of identity authentication and license authorization system based on machine fingerprint Chengdu:University of Electronic Science and Technology of China 2011."},{"key":"e_1_3_2_1_9_1","first-page":"123","article-title":"of the software lock function based on Fingerprint within hardware","volume":"2013","author":"LI","unstructured":"LI Zhi-wei, YANG Mao-xing, TIE Yue-huan. Implementation of the software lock function based on Fingerprint within hardware , Microelectronics&Computer , 2013 ,30(4), 123 - 126 . LI Zhi-wei,YANG Mao-xing,TIE Yue-huan.Implementation of the software lock function based on Fingerprint within hardware,Microelectronics&Computer,2013,30(4),123-126.","journal-title":"Microelectronics&Computer"},{"key":"e_1_3_2_1_10_1","unstructured":"DU J X.Contextual Authentication Technology Based on Fingerprint of Internet of Things Nanjing:Nanjing University of Posts and Telecommunications 2019.  DU J X.Contextual Authentication Technology Based on Fingerprint of Internet of Things Nanjing:Nanjing University of Posts and Telecommunications 2019."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.10.005"},{"key":"e_1_3_2_1_12_1","unstructured":"LIN Meng-lei LIU Jing-hua WANG Chen-xi et.al Multi-label Feature Selection Algorithm Based on Label Weighting Computer Science 2017 44(10):289-295.  LIN Meng-lei LIU Jing-hua WANG Chen-xi et.al Multi-label Feature Selection Algorithm Based on Label Weighting Computer Science 2017 44(10):289-295."},{"key":"e_1_3_2_1_13_1","first-page":"136","article-title":"and implementation of secure access method for IoT devices based on device fingerprint","volume":"2019","author":"LU","unstructured":"LU Wen-di, LI Xiao-hui, WANG Han .Research and implementation of secure access method for IoT devices based on device fingerprint , Electronic Design Engineering , 2019 ,27(3): 136 - 141 . LU Wen-di,LI Xiao-hui,WANG Han.Research and implementation of secure access method for IoT devices based on device fingerprint,Electronic Design Engineering,2019,27(3):136-141.","journal-title":"Electronic Design Engineering"},{"issue":"168","key":"e_1_3_2_1_14_1","first-page":"92","article-title":"feature selection based on max-dependency and min-redundancy.","volume":"2015","author":"LIN Y,HU Q,LIU","unstructured":"LIN Y,HU Q,LIU J,etal.Multi-label feature selection based on max-dependency and min-redundancy. Neurocomputing , 2015 ( 168 ): 92 - 103 . LIN Y,HU Q,LIU J,etal.Multi-label feature selection based on max-dependency and min-redundancy.Neurocomputing,2015(168):92-103.","journal-title":"Neurocomputing"},{"key":"e_1_3_2_1_15_1","first-page":"3478","article-title":"feature selection algorithm based on mutual information","volume":"2020","author":"YONG","unstructured":"YONG Ju-ya, ZHOU Zhong-mei,Multi-level feature selection algorithm based on mutual information , Journal of Computer Applications , 2020 ,40(12): 3478 - 3484 . YONG Ju-ya,ZHOU Zhong-mei,Multi-level feature selection algorithm based on mutual information,Journal of Computer Applications,2020,40(12):3478-3484.","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_16_1","first-page":"503","article-title":"Multi-label feature selection algorithm based on conditional mutual information of expert feature","volume":"2020","author":"CHENG","unstructured":"CHENG Yu-sheng, SONG Fan , WANG Yi-bin, Multi-label feature selection algorithm based on conditional mutual information of expert feature , Journal of Computer Applications , 2020 , 40(2): 503 - 509 . CHENG Yu-sheng,SONG Fan,WANG Yi-bin,et al.Multi-label feature selection algorithm based on conditional mutual information of expert feature,Journal of Computer Applications,2020, 40(2):503-509.","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_17_1","unstructured":"Christor Paar Jan Pelzl Understanding Cryptography:A Textbook for Students and Practitioners.Beijing:Tsinghua university press 2012.238-241  Christor Paar Jan Pelzl Understanding Cryptography:A Textbook for Students and Practitioners.Beijing:Tsinghua university press 2012.238-241"},{"key":"e_1_3_2_1_18_1","first-page":"327","article-title":"commercial cryptographic algorithm and its performance analysis.","volume":"2019","author":"Jian YAO","unstructured":"YAO Jian .Domestic commercial cryptographic algorithm and its performance analysis. Computer Applications and Software , 2019 ,36(6): 327 - 333 . YAO Jian.Domestic commercial cryptographic algorithm and its performance analysis.Computer Applications and Software,2019,36(6):327-333.","journal-title":"Computer Applications and Software"}],"event":{"name":"ICIT 2021: IoT and Smart City","acronym":"ICIT 2021","location":"Guangzhou China"},"container-title":["2021 The 9th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512576.3512628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3512576.3512628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:52Z","timestamp":1750191112000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3512576.3512628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,22]]},"references-count":18,"alternative-id":["10.1145\/3512576.3512628","10.1145\/3512576"],"URL":"https:\/\/doi.org\/10.1145\/3512576.3512628","relation":{},"subject":[],"published":{"date-parts":[[2021,12,22]]},"assertion":[{"value":"2022-04-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}