Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in
the context of the industry as digitization becomes a business priority for various …
the context of the industry as digitization becomes a business priority for various …
An efficient identity-based aggregate signcryption scheme with blockchain for IoT-enabled maritime transportation system
Y Yang, D He, P Vijayakumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Maritime transportation has ushered in a period of vigorous development and has been the
most critical mode of transport in international trade. Maritime communication is also …
most critical mode of transport in international trade. Maritime communication is also …
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
In body sensor networks, both wearable and implantable biosensors are deployed in a
patient body to monitor and collect patient health record information. The health record …
patient body to monitor and collect patient health record information. The health record …
Efficient pairing-free identity-based signcryption scheme for cloud-assisted iot
Abstract The Internet of Things (IoT) has become a part of our everyday life. Due to limited
storage and computational capabilities, data collected by IoT devices outsource to cloud …
storage and computational capabilities, data collected by IoT devices outsource to cloud …
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
Y Zhou, Y Xu, Z Qiao, B Yang, M Zhang - Theoretical Computer Science, 2021 - Elsevier
Leakage of private information, eg the secret keys, has become a serious threat to the
security of computing systems. It has become a common requirement that real-world security …
security of computing systems. It has become a common requirement that real-world security …
Identity-based signcryption scheme for medical cyber physical system in standard model
The medical cyber-physical system (MCPS) has recently received massive consideration
with the growth of healthcare 4.0. However, maintaining confidentially of such highly …
with the growth of healthcare 4.0. However, maintaining confidentially of such highly …
An enhanced certificateless signcryption in the standard model
M Luo, Y Wan - Wireless Personal Communications, 2018 - Springer
Signcryption is a cryptography prototype which performs message encryption and signature
in a logical step. Certificateless public key cryptography successfully resolves the problem of …
in a logical step. Certificateless public key cryptography successfully resolves the problem of …
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector
has evolved significantly in recent years. However, security breaches reveal incorrect …
has evolved significantly in recent years. However, security breaches reveal incorrect …
Security analysis of an enhanced certificateless signcryption in the standard model
Y Yuan - Wireless Personal Communications, 2020 - Springer
Abstract Quite recently, Luo and Wan putted forward a new certificateless signcryption
(CLSC) scheme with low computation cost in the standard model. They stated that their …
(CLSC) scheme with low computation cost in the standard model. They stated that their …
An efficient pairing-free certificateless signcryption without secure channel communication during secret key issuance☆
Signcryption is one of the recent public key paradigms that satisfies both the requirement of
authenticity and confidentiality of messages between parties. However, most of all the …
authenticity and confidentiality of messages between parties. However, most of all the …