Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
A survey on internet of things: Applications, recent issues, attacks, and security mechanisms
The Internet of Things (IoT) is a series of recording devices, mechanical and automated
machines, documents, creatures, or individuals that have one of the user identifiers and the …
machines, documents, creatures, or individuals that have one of the user identifiers and the …
A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …
transportation efficiency, reduce energy consumption, and traffic accidents. However …
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
With the widespread popularity and usage of Internet-enabled devices, Internet of things has
become one of the most popular techniques of the modern era. However, data generated …
become one of the most popular techniques of the modern era. However, data generated …
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …
information about the physical conditions of patients. Due to the openness and mobility of …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
Lightweight IoT-based authentication scheme in cloud computing circumstance
Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud
computing have been promptly investigated for secure data retrieval and robust access …
computing have been promptly investigated for secure data retrieval and robust access …
Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
Rapid advances in wireless communication technologies have paved the way for a wide
range of mobile devices to become increasingly ubiquitous and popular. Mobile devices …
range of mobile devices to become increasingly ubiquitous and popular. Mobile devices …
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
Agriculture is the backbone of our economic system and plays an important role in the life of
an economy. It does not only provide raw material and food, but also provides large …
an economy. It does not only provide raw material and food, but also provides large …
Efficient privacy-aware authentication scheme for mobile cloud computing services
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …