{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:03Z","timestamp":1750220163478,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3558819.3565145","type":"proceedings-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T01:37:33Z","timestamp":1666834653000},"page":"564-568","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Information Security System of Electronic Information Wireless Transmission under Computer Virtual Reality Technology"],"prefix":"10.1145","author":[{"given":"Xiangxia","family":"Cui","sequence":"first","affiliation":[{"name":"Taishan University, China"}]},{"given":"Jun","family":"Chen","sequence":"additional","affiliation":[{"name":"Taishan University, China"}]},{"given":"Chuantao","family":"Ma","sequence":"additional","affiliation":[{"name":"Taishan University, China"}]},{"given":"Chunling","family":"Jiang","sequence":"additional","affiliation":[{"name":"Taishan University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"43","article-title":"Electronic payment information security encryption system based on big data technology","volume":"44","author":"Juanjuan Pan","year":"2021","unstructured":"Pan Juanjuan , Li Ming . Electronic payment information security encryption system based on big data technology . Modern Electronic Technology , vol. 44 , pp. 43 - 47 ,Thirteen 2021 . Pan Juanjuan, Li Ming. Electronic payment information security encryption system based on big data technology. Modern Electronic Technology, vol. 44, pp. 43-47,Thirteen 2021.","journal-title":"Modern Electronic Technology"},{"key":"e_1_3_2_1_2_1","first-page":"59","volume":"42","author":"Jun Liu","year":"2021","unstructured":"Liu Jun , Zhang Lili , Jiang Xianghong , Multivariate RC-LDPC Information Security Transmission Algorithm Based on Satellite Communication System . Journal of Northeastern University: Natural Science Edition , vol. 42 , pp. 59 - 62 , February 2021 . Liu Jun, Zhang Lili, Jiang Xianghong, Multivariate RC-LDPC Information Security Transmission Algorithm Based on Satellite Communication System. Journal of Northeastern University: Natural Science Edition, vol. 42, pp. 59-62,February 2021.","journal-title":"Journal of Northeastern University: Natural Science Edition"},{"key":"e_1_3_2_1_3_1","first-page":"43","article-title":"Research on RFID-based logistics information security system","volume":"2020","author":"Yin Quan","year":"2020","unstructured":"Quan Yin . Research on RFID-based logistics information security system . Modern Electronic Technology ,vol. 2020 , 43 , pp. 40-47, Nineteen 2020 . Quan Yin. Research on RFID-based logistics information security system. Modern Electronic Technology,vol.2020,43, pp. 40-47, Nineteen 2020.","journal-title":"Modern Electronic Technology"},{"key":"e_1_3_2_1_4_1","first-page":"45","article-title":"Construction of Big Data System for Electronic Information Equipment Test","volume":"42","author":"Xudong Hao","year":"2020","unstructured":"Hao Xudong , Yuan Jianwei , Liu Daowei . Construction of Big Data System for Electronic Information Equipment Test . Command Control and Simulation , vol. 42 , pp. 45 - 51 , January 2020 . Hao Xudong, Yuan Jianwei, Liu Daowei. Construction of Big Data System for Electronic Information Equipment Test. Command Control and Simulation, vol. 42, pp. 45-51,January 2020.","journal-title":"Command Control and Simulation"},{"key":"e_1_3_2_1_5_1","first-page":"58","volume-title":"Design and Simulation of Wireless Charging Transmission System Based on Electromagnetic Induction. Electronic Technology Application","author":"Xiaosong Tian","year":"2020","unstructured":"Tian Xiaosong , Yang Hua , Cai Xianyun , Design and Simulation of Wireless Charging Transmission System Based on Electromagnetic Induction. Electronic Technology Application , vol. 46 , pp. 58 - 62 , April 2020 . Tian Xiaosong, Yang Hua, Cai Xianyun, Design and Simulation of Wireless Charging Transmission System Based on Electromagnetic Induction. Electronic Technology Application, vol.46, pp. 58-62,April 2020."},{"key":"e_1_3_2_1_6_1","first-page":"46","article-title":"Research on Information Security Transmission of Multi-User Wireless Projection System","volume":"21","author":"Qinqin Jing","year":"2021","unstructured":"Jing Qinqin . Research on Information Security Transmission of Multi-User Wireless Projection System . Application of Single Chip Microcomputer and Embedded System , vol. 21 , pp. 46 - 55 , May 2021 . Jing Qinqin. Research on Information Security Transmission of Multi-User Wireless Projection System. Application of Single Chip Microcomputer and Embedded System, vol. 21, pp. 46-55,May 2021.","journal-title":"Application of Single Chip Microcomputer and Embedded System"},{"key":"e_1_3_2_1_7_1","first-page":"55","article-title":"Design of optical fiber information security transmission system based on FPGA","volume":"42","author":"Wenfeng Geng","year":"2021","unstructured":"Geng Wenfeng . Design of optical fiber information security transmission system based on FPGA . Laser Journal ,vol. 42 ,pp. 55 - 59 , August 2021 . Geng Wenfeng. Design of optical fiber information security transmission system based on FPGA. Laser Journal,vol.42,pp.55-59,August 2021.","journal-title":"Laser Journal"}],"event":{"name":"ICCSIE2022: 7th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE2022","location":"Brisbane QLD Australia"},"container-title":["Proceedings of the 7th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565145","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558819.3565145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:29Z","timestamp":1750186829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":7,"alternative-id":["10.1145\/3558819.3565145","10.1145\/3558819"],"URL":"https:\/\/doi.org\/10.1145\/3558819.3565145","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}