Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on routing protocols supported by the Contiki Internet of things operating system
Standardization and technology advancements have helped the realization of the Internet of
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
BSN-Care: A secure IoT-based modern healthcare system using body sensor network
P Gope, T Hwang - IEEE sensors journal, 2015 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the modern health care environment, the usage of IoT …
Internet of Things (IoT). In the modern health care environment, the usage of IoT …
Message-locked encryption and secure deduplication
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …
where the key under which encryption and decryption are performed is itself derived from …
Breaking symmetric cryptosystems using quantum period finding
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography.
This motivated the cryptographic community to search for quantum-safe solutions. On the …
This motivated the cryptographic community to search for quantum-safe solutions. On the …
[CARTE][B] Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to kee** information safe, in an era when the …
cryptography experts. Cryptography is vital to kee** information safe, in an era when the …
A key-management scheme for distributed sensor networks
L Eschenauer, VD Gligor - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes
with limited computation and communication capabilities. DSNs are dynamic in the sense …
with limited computation and communication capabilities. DSNs are dynamic in the sense …
A secure IoT-based modern healthcare system with fault-tolerant decision making process
The advent of Internet of Things (IoT) has escalated the information sharing among various
smart devices by many folds, irrespective of their geographical locations. Recently …
smart devices by many folds, irrespective of their geographical locations. Recently …
Scalable and efficient provable data possession
Storage outsourcing is a rising trend which prompts a number of interesting security issues,
many of which have been extensively investigated in the past. However, Provable Data …
many of which have been extensively investigated in the past. However, Provable Data …
FPGA intrinsic PUFs and their use for IP protection
In recent years, IP protection of FPGA hardware designs has become a requirement for
many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different …
many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different …