Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Schottky‐contacted nanowire sensors
The progress of the Internet‐of‐Things in the past few years has necessitated the support of
high‐performance sensors. Schottky‐contacted nanowire sensors have attracted …
high‐performance sensors. Schottky‐contacted nanowire sensors have attracted …
A survey on zero-knowledge authentication for internet of things
Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of
IoT smart devices can lead to the destruction of networks in untrustworthy environments …
IoT smart devices can lead to the destruction of networks in untrustworthy environments …
SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles
As an application of Internet of Things (IoT) technology, the Internet of Vehicles (IoV) faces
two main security issues:(1) the central server of the IoV may not be powerful enough to …
two main security issues:(1) the central server of the IoV may not be powerful enough to …
Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things
Nowadays, with the advancement of smart technologies, the Internet of Things (IoT)
emerged as a booming technology that can provide better quality and facilities for the …
emerged as a booming technology that can provide better quality and facilities for the …
Threats on the horizon: Understanding security threats in the era of cyber-physical systems
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were
made possible by higher integration of physical and digital elements. In today's pervasive …
made possible by higher integration of physical and digital elements. In today's pervasive …
BP-AKAA: Blockchain-enforced privacy-preserving authentication and key agreement and access control for IIoT
Abstract The Industrial Internet of Things (IIoT) links multiple subnets to accomplish more
real-time, efficient, and high-class production. Authentication is an essential prerequisite for …
real-time, efficient, and high-class production. Authentication is an essential prerequisite for …
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for iot client node authentication
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …
especially in client authentication. The current authentication methods require significant …
A service-oriented approach for sensing in the Internet of Things: Intelligent transportation systems and privacy use cases
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA),
called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to …
called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to …
[HTML][HTML] A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs
High-entropy random numbers are an essential part of cryptography, and Quantum Random
Number Generators (QRNG) are an emergent technology that can provide high-quality keys …
Number Generators (QRNG) are an emergent technology that can provide high-quality keys …
[HTML][HTML] Emerging authentication technologies for zero trust on the internet of things
The large and interconnected nature of the Internet of Things (IoT) presents unique security
challenges, even as it revolutionizes various sectors. With numerous devices, often limited in …
challenges, even as it revolutionizes various sectors. With numerous devices, often limited in …