Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …
have given humans access to interact virtually with objects. Until now, numerous virtual …
An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities
A smart city is where existing facilities and services are enhanced by digital technology to
benefit people and companies. The most critical infrastructures in this city are …
benefit people and companies. The most critical infrastructures in this city are …
Design of secure mutual authentication scheme for metaverse environments using blockchain
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …
education and meetings has increased. However, since the conventional online …
An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment
Recently, the Digital Twin (DT) technology has procured a lot of attention because of its
applicability in the manufacturing and space industries. The DT environment involves the …
applicability in the manufacturing and space industries. The DT environment involves the …
Design of secure and lightweight authentication scheme for UAV-enabled intelligent transportation systems using blockchain and PUF
Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an
advanced technology that can provide various services including autonomous driving, real …
advanced technology that can provide various services including autonomous driving, real …
Blockchain-assisted lightweight authenticated key agreement security framework for smart vehicles-enabled intelligent transportation system
Intelligent Transportation Systems (ITS) supported by smart vehicles have revolutionized
modern transportation, offering a wide range of applications and services, such as electronic …
modern transportation, offering a wide range of applications and services, such as electronic …
A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks
JY Lee, J Oh, Y Park - Electronics, 2023 - mdpi.com
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have
enabled medical professionals to identify patients' health information in real time to identify …
enabled medical professionals to identify patients' health information in real time to identify …
[HTML][HTML] A symmetric key and elliptic curve cryptography-based protocol for message encryption in unmanned aerial vehicles
Unmanned aerial vehicles have found applications in fields such as environmental
monitoring and the military. Although the collected data in some of these application …
monitoring and the military. Although the collected data in some of these application …
[HTML][HTML] Provably secure lightweight mutual authentication and key agreement scheme for cloud-based iot environments
S Ju, Y Park - Sensors, 2023 - mdpi.com
A paradigm that combines cloud computing and the Internet of Things (IoT) allows for more
impressive services to be provided to users while addressing storage and computational …
impressive services to be provided to users while addressing storage and computational …
SEMS-5G: a secure and efficient multi-server authentication scheme for 5g networks
The fifth-generation (5G) network is regarded as a key enabler technology for promoting the
Internet of Things (IoT) and overcoming the corresponding challenges in the future, such as …
Internet of Things (IoT) and overcoming the corresponding challenges in the future, such as …