Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Lightweight public key infrastructure for the Internet of Things: A systematic literature review
M El-Hajj, P Beune - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed everyday environments into
interconnected cyber–physical systems, enabling automation and assistance for diverse …
interconnected cyber–physical systems, enabling automation and assistance for diverse …
Secure communication in UAV assisted HetNets: a proposed model
A Rashid, D Sharma, TA Lone, S Gupta… - Security, Privacy, and …, 2019 - Springer
In the current scientific and technological world, every emerging/advanced country employs
Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its …
Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its …
Serial communication protocol with enhanced properties–securing communication layer for smart sensors applications
The essential component of all the control and sensory systems is a communication layer.
The MODBUS protocol used in automation and sensory industry defines a simple format of …
The MODBUS protocol used in automation and sensory industry defines a simple format of …
Applications of identity-based cryptography in smart home and healthcare: A recent review
S Garg, S Nayak, AB Bavani Sankar, S Maity - Cyber Security in Intelligent …, 2022 - Springer
Advancement in technology has led to an exponential growth of Internet of Things (IoT)
devices. IoT devices make our lives easier by providing all the advantages in relation to …
devices. IoT devices make our lives easier by providing all the advantages in relation to …
The case for federated identity management in 5G communications
The heterogeneous nature of fifth generation mobile network (5G) makes the access and
provision of network services very difficult and raises security concerns. With multi-users and …
provision of network services very difficult and raises security concerns. With multi-users and …
Lightweight public key infrastructure for IoT
PF Beune - 2023 - essay.utwente.nl
The term Internet of Things (IoT) refers to real-world physical objects that have sensors,
computing power, and software that may communicate to other systems and devices over …
computing power, and software that may communicate to other systems and devices over …
Identity-based encryption in UAV assisted HetNets: A survey
In this modern technological world, the Unmanned Ariel Vehicle (UAV) assisted
Heterogeneous Networks (HetNets) is almost being used by every develo**/developed …
Heterogeneous Networks (HetNets) is almost being used by every develo**/developed …
Implementation of a strongly robust identity-based encryption scheme over type-3 pairings
1.1 Background Public-key encryption (PKE) is an important mechanism for maintaining
security in several organizations. Identity-based encryption (IBE)[52] is an extension of PKE …
security in several organizations. Identity-based encryption (IBE)[52] is an extension of PKE …
Towards indeterminacy-tolerant access control in iot
The ultimate goal of any access control system is to assign precisely the necessary level of
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …
Sm9 digital signature with non-repudiation
M Wang, Y Long - 2020 16th International Conference on …, 2020 - ieeexplore.ieee.org
SM9 is an identity-based cryptography algorithm published by the State Cryptography
Administration of China. With SM9, a user's private key for signing is generated by a central …
Administration of China. With SM9, a user's private key for signing is generated by a central …