{"id":"https://openalex.org/W3188995693","doi":"https://doi.org/10.1109/icc42927.2021.9500888","title":"Building a Secure Video Conference System with Customized Cryptographic USB Keys","display_name":"Building a Secure Video Conference System with Customized Cryptographic USB Keys","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3188995693","doi":"https://doi.org/10.1109/icc42927.2021.9500888","mag":"3188995693"},"language":"en","primary_location":{"id":"doi:10.1109/icc42927.2021.9500888","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500888","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041038433","display_name":"Pengyi Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pengyi Wu","raw_affiliation_strings":["Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027215089","display_name":"Quanwei Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quanwei Cai","raw_affiliation_strings":["Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011886723","display_name":"Qiongxiao Wang","orcid":"https://orcid.org/0000-0002-8012-8295"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiongxiao Wang","raw_affiliation_strings":["Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000896761","display_name":"Hongjin Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I2250653659","display_name":"Tencent (China)","ror":"https://ror.org/00hhjss72","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250653659"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongjin Cao","raw_affiliation_strings":["Tencent Technology (Beijing) Co., Ltd,Beijing,China","Tencent Technology (Beijing) Co., Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tencent Technology (Beijing) Co., Ltd,Beijing,China","institution_ids":["https://openalex.org/I2250653659"]},{"raw_affiliation_string":"Tencent Technology (Beijing) Co., Ltd, Beijing, China","institution_ids":["https://openalex.org/I2250653659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041038433"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.2882,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.55204248,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7969235181808472},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6556771397590637},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.652675211429596},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.555457592010498},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.534747302532196},{"id":"https://openalex.org/keywords/usb","display_name":"USB","score":0.5122615694999695},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4637952446937561},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4590649902820587},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45619019865989685},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4494013786315918},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3779526948928833},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.33005017042160034},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.32105928659439087},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1710139811038971}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7969235181808472},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6556771397590637},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.652675211429596},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.555457592010498},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.534747302532196},{"id":"https://openalex.org/C507366226","wikidata":"https://www.wikidata.org/wiki/Q42378","display_name":"USB","level":3,"score":0.5122615694999695},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4637952446937561},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4590649902820587},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45619019865989685},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4494013786315918},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3779526948928833},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.33005017042160034},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.32105928659439087},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1710139811038971},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc42927.2021.9500888","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500888","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2059212242","https://openalex.org/W2062767663","https://openalex.org/W2068713433","https://openalex.org/W2124735649","https://openalex.org/W2170961388","https://openalex.org/W2266218113","https://openalex.org/W2282193493","https://openalex.org/W2344891549","https://openalex.org/W2397035252","https://openalex.org/W2509355615","https://openalex.org/W2540231424","https://openalex.org/W2909546496","https://openalex.org/W2950940714","https://openalex.org/W6685227140","https://openalex.org/W6763830806"],"related_works":["https://openalex.org/W2376632526","https://openalex.org/W2888183313","https://openalex.org/W2953298321","https://openalex.org/W3118396505","https://openalex.org/W4287548350","https://openalex.org/W2181463986","https://openalex.org/W2127786239","https://openalex.org/W3007998911","https://openalex.org/W2314295416","https://openalex.org/W2484177002"],"abstract_inverted_index":{"The":[0,223],"video":[1,35,56,96,149,161,178,220,232],"conference":[2,97,221],"has":[3,156],"been":[4],"widely":[5],"adopted":[6],"for":[7,107,217],"telecommuting":[8],"due":[9,29],"to":[10,18,30,184,197,211],"the":[11,20,25,31,34,37,42,47,55,73,78,83,101,118,141,148,160,165,193,199,205,213],"convenience,":[12],"and":[13,22,68,80,111,123,128,168,189,208,215],"various":[14,60],"schemes":[15],"are":[16],"proposed":[17,206],"provide":[19,212],"confidentiality":[21,79,214],"integrity":[23,81,216],"of":[24,33,49,82,143,177,187],"stream":[26,84,194],"data.":[27],"However,":[28],"limitation":[32],"terminals,":[36,57],"adversary":[38],"can":[39,170,228],"still":[40],"obtain":[41],"cryptographic":[43,74,102,109,119,144],"key":[44,75,104,113,120,126,145],"by":[45,99],"exploiting":[46],"vulnerabilities":[48],"OS":[50],"or":[51,58],"other":[52,185],"binaries":[53],"in":[54,131,173],"launching":[59],"attacks":[61,67],"such":[62],"as":[63],"cold-boot":[64],"attacks,":[65],"DMA":[66],"side":[69],"channel":[70],"attacks.":[71],"Once":[72],"is":[76,121,151,181],"leaked,":[77],"data":[85,129,195],"will":[86],"be":[87,171,198],"broken.":[88],"In":[89,115],"this":[90],"paper,":[91],"we":[92],"propose":[93],"a":[94,133,218],"secure":[95,112],"system":[98],"customizing":[100],"USB":[103,166],"(called":[105],"CCUK)":[106],"efficient":[108],"computation":[110],"storage.":[114],"our":[116],"scheme,":[117,207],"stored":[122],"used":[124],"(i.e.,":[125],"agreement":[127],"encryption/decryption)":[130],"CCUK,":[132],"dedicated":[134],"hardware":[135],"security":[136],"module":[137],"(HSM),":[138],"which":[139],"avoids":[140,192],"leakage":[142],"even":[146],"when":[147],"terminal":[150],"compromised.":[152],"Moreover,":[153],"CCUK":[154,180,227],"only":[155],"one":[157],"requirement":[158],"on":[159],"terminal,":[162],"i.e.,":[163],"having":[164],"interface,":[167],"therefore":[169],"deployed":[172,209],"almost":[174],"all":[175],"types":[176,186],"terminals.":[179],"cost-effective":[182],"compared":[183],"HSMs,":[188],"its":[190],"efficiency":[191],"encryption/decryption":[196],"performance":[200],"bottleneck.":[201],"We":[202],"have":[203],"implemented":[204],"it":[210],"practical":[219],"system.":[222],"evaluation":[224],"demonstrates":[225],"that":[226],"support":[229],"1080P":[230],"HD":[231],"conference.":[233]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
