Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: Communication across distributed ledgers
Since the inception of Bitcoin, a plethora of distributed ledgers differing in design and
purpose has been created. While by design, blockchains provide no means to securely …
purpose has been created. While by design, blockchains provide no means to securely …
[BUCH][B] Life itself: a comprehensive inquiry into the nature, origin, and fabrication of life
R Rosen - 1991 - books.google.com
Why are living things alive? As a theoretical biologist, Robert Rosen saw this as the most
fundamental of all questions-and yet it had never been answered satisfactorily by science …
fundamental of all questions-and yet it had never been answered satisfactorily by science …
Automated security protocol analysis with the AVISPA tool
L Vigano - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security
Protocols and Applications. It provides a modular and expressive formal language for …
Protocols and Applications. It provides a modular and expressive formal language for …
[BUCH][B] The modelling and analysis of security protocols: the CSP approach
P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …
communication and processing of information, ensuring its confidentiality, integrity …
Optimistic fair exchange of digital signatures
We present a new protocol that allows two players to exchange digital signatures over the
Internet in a fair way, so that either each player gets the other's signature, or neither player …
Internet in a fair way, so that either each player gets the other's signature, or neither player …
Accountability: definition and relationship to verifiability
R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010 - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …
auction, identity-based encryption, and certain forms of secure multi-party computation …
[PDF][PDF] On the impossibility of fair exchange without a trusted third party
H Pagnia, FC Gärtner - 1999 - Citeseer
We attempt to formally de ne the strong fair exchange problem and present a proof that it is
impossible to solve strong fair exchange without a trusted third party. The proof is …
impossible to solve strong fair exchange without a trusted third party. The proof is …
Disentangling features in 3D face shapes for joint face reconstruction and recognition
This paper proposes an encoder-decoder network to disentangle shape features during 3D
face shape reconstruction from single 2D images, such that the tasks of learning …
face shape reconstruction from single 2D images, such that the tasks of learning …
An intensive survey of fair non-repudiation protocols
With the phenomenal growth of the Internet and open networks in general, security services,
such as non-repudiation, become crucial to many applications. Non-repudiation services …
such as non-repudiation, become crucial to many applications. Non-repudiation services …
Bitcoin-based fair payments for outsourcing computations of fog devices
Fog computing can be viewed as an extension of cloud computing that enables transactions
and resources at the edge of the network. In the paradigms of fog computing, the fog user …
and resources at the edge of the network. In the paradigms of fog computing, the fog user …