{"id":"https://openalex.org/W3002537336","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965730","title":"A Real-Time Perception Information Security Algorithm in Internet of Things","display_name":"A Real-Time Perception Information Security Algorithm in Internet of Things","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3002537336","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965730","mag":"3002537336"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei48845.2019.8965730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081352170","display_name":"Guilan Luo","orcid":"https://orcid.org/0000-0003-0915-2003"},"institutions":[{"id":"https://openalex.org/I6593398","display_name":"Dali University","ror":"https://ror.org/02y7rck89","country_code":"CN","type":"education","lineage":["https://openalex.org/I6593398"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guilan Luo","raw_affiliation_strings":["Institute of mathematics and computer, Dali University,Dali,Yunnan,China","Institute of mathematics and computer, Dali University, Dali, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"Institute of mathematics and computer, Dali University,Dali,Yunnan,China","institution_ids":["https://openalex.org/I6593398"]},{"raw_affiliation_string":"Institute of mathematics and computer, Dali University, Dali, Yunnan, China","institution_ids":["https://openalex.org/I6593398"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400635","display_name":"Mei Zhang","orcid":"https://orcid.org/0000-0003-1939-302X"},"institutions":[{"id":"https://openalex.org/I6593398","display_name":"Dali University","ror":"https://ror.org/02y7rck89","country_code":"CN","type":"education","lineage":["https://openalex.org/I6593398"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mei Zhang","raw_affiliation_strings":["Institute of mathematics and computer, Dali University,Dali,Yunnan,China","Institute of mathematics and computer, Dali University, Dali, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"Institute of mathematics and computer, Dali University,Dali,Yunnan,China","institution_ids":["https://openalex.org/I6593398"]},{"raw_affiliation_string":"Institute of mathematics and computer, Dali University, Dali, Yunnan, China","institution_ids":["https://openalex.org/I6593398"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035787125","display_name":"Haiguang Li","orcid":"https://orcid.org/0009-0004-6141-8993"},"institutions":[{"id":"https://openalex.org/I6593398","display_name":"Dali University","ror":"https://ror.org/02y7rck89","country_code":"CN","type":"education","lineage":["https://openalex.org/I6593398"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiguang Li","raw_affiliation_strings":["Institute of mathematics and computer, Dali University,Dali,Yunnan,China","Institute of mathematics and computer, Dali University, Dali, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"Institute of mathematics and computer, Dali University,Dali,Yunnan,China","institution_ids":["https://openalex.org/I6593398"]},{"raw_affiliation_string":"Institute of mathematics and computer, Dali University, Dali, Yunnan, China","institution_ids":["https://openalex.org/I6593398"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100650728","display_name":"Gang Li","orcid":"https://orcid.org/0000-0003-3973-1444"},"institutions":[{"id":"https://openalex.org/I6593398","display_name":"Dali University","ror":"https://ror.org/02y7rck89","country_code":"CN","type":"education","lineage":["https://openalex.org/I6593398"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Li","raw_affiliation_strings":["Institute of mathematics and computer, Dali University,Dali,Yunnan,China","Institute of mathematics and computer, Dali University, Dali, Yunnan, China"],"affiliations":[{"raw_affiliation_string":"Institute of mathematics and computer, Dali University,Dali,Yunnan,China","institution_ids":["https://openalex.org/I6593398"]},{"raw_affiliation_string":"Institute of mathematics and computer, Dali University, Dali, Yunnan, China","institution_ids":["https://openalex.org/I6593398"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081352170"],"corresponding_institution_ids":["https://openalex.org/I6593398"],"apc_list":null,"apc_paid":null,"fwci":0.1012,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47360434,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9559000134468079,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9528999924659729,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7980002164840698},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7542153596878052},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6330904364585876},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.62611323595047},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6006541848182678},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.48891106247901917},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4233935475349426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3498760759830475},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.23804819583892822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7980002164840698},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7542153596878052},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6330904364585876},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.62611323595047},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6006541848182678},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.48891106247901917},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4233935475349426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3498760759830475},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.23804819583892822},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei48845.2019.8965730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965730","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1985273268","https://openalex.org/W1988037376","https://openalex.org/W2096272700","https://openalex.org/W2293494042","https://openalex.org/W2462151092","https://openalex.org/W2905244548","https://openalex.org/W2941990895","https://openalex.org/W2943089161","https://openalex.org/W2965710869","https://openalex.org/W3048264349"],"related_works":["https://openalex.org/W2595172197","https://openalex.org/W2084856301","https://openalex.org/W2127970246","https://openalex.org/W2885125400","https://openalex.org/W1989889224","https://openalex.org/W4382618745","https://openalex.org/W1973775000","https://openalex.org/W2748922771","https://openalex.org/W1987128138","https://openalex.org/W2743976221"],"abstract_inverted_index":{"In":[0],"the":[1,110,114,128,137],"real-time":[2,39],"monitoring":[3],"of":[4,12,22,46,54,76,83,93,107,139,141],"insect":[5],"ecological":[6],"environment":[7],"in":[8,124,136],"Erhai":[9],"wetland,":[10],"Internet":[11,45,140],"Things":[13],"technology":[14],"is":[15,50],"used":[16],"by":[17],"us.":[18],"But":[19],"information":[20,41],"perception":[21,40],"embedded":[23],"devices":[24],"has":[25,116],"privacy":[26,131],"security":[27,42],"problems.":[28],"Therefore,":[29],"based":[30,51],"on":[31,52],"RSA":[32,77,122],"asymmetric":[33],"encryption":[34],"algorithm,":[35],"we":[36],"propose":[37],"a":[38],"algorithm":[43,49,78,115],"for":[44],"Things.":[47,142],"The":[48],"selection":[53],"large":[55,84,91,98],"power":[56,67,95],"prime":[57,85],"number":[58,86],"with":[59],"probability":[60],"two,":[61],"linear":[62],"private":[63],"key":[64],"calculation,":[65],"modular":[66,94],"operation":[68],"and":[69,97,105,132],"so":[70],"on.":[71],"It":[72,126],"solves":[73],"bottleneck":[74],"problems":[75],"such":[79],"as":[80],"low":[81],"efficiency":[82],"generation,":[87],"slow":[88],"code":[89],"implementation,":[90],"amount":[92],"calculation":[96],"data":[99],"storage":[100],"capacity.":[101],"Through":[102],"simulation":[103],"test":[104],"analysis":[106],"time":[108],"complexity,":[109],"results":[111],"show":[112],"that":[113],"better":[117],"performance":[118,134],"than":[119],"other":[120,133],"improved":[121],"algorithms":[123],"computer.":[125],"meets":[127],"real-time,":[129],"energy-saving,":[130],"requirements":[135],"application":[138]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
