Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Digitization of healthcare sector: A study on privacy and security concerns
The digital revolution has taken business sectors to a new height through the advancement
of technology. The healthcare sector also embraced digital technology to facilitate …
of technology. The healthcare sector also embraced digital technology to facilitate …
[HTML][HTML] Internet of things: Security and solutions survey
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …
each aspect of everyday living is creating a promising prospect for the involvement of …
Design of secure mutual authentication scheme for metaverse environments using blockchain
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …
education and meetings has increased. However, since the conventional online …
PAAF-SHS: PUF and authenticated encryption based authentication framework for the IoT-enabled smart healthcare system
A Aldosary, M Tanveer - Internet of things, 2024 - Elsevier
Abstract The Internet of Things (IoT) is increasingly becoming a fundamental component of
our everyday existence with the swift advancement in communication technology. Critical …
our everyday existence with the swift advancement in communication technology. Critical …
On the design of a privacy-preserving communication scheme for cloud-based digital twin environments using blockchain
Digital twin technology is recently in the spotlight because of its potential applicability in
business and industry. In digital twin environments, data generated from physical assets are …
business and industry. In digital twin environments, data generated from physical assets are …
Key distribution and authentication protocols in wireless sensor networks: A survey
S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …
study various phenomena and to improve our lives. Hence, the sensors are used in …
A secure and anonymous user authentication scheme for IoT-enabled smart home environments using PUF
With the continuous development of Internet of Things (IoT) technology, research on smart
home environments is being conducted by many researchers. In smart home environments …
home environments is being conducted by many researchers. In smart home environments …
Design of secure handover authentication scheme for urban air mobility environments
Urban air mobility (UAM) is a future air transportation system to solve the air pollution and
movement efficiency problems of the traditional mobility system. In UAM environments …
movement efficiency problems of the traditional mobility system. In UAM environments …
Design of secure and lightweight authentication scheme for UAV-enabled intelligent transportation systems using blockchain and PUF
Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an
advanced technology that can provide various services including autonomous driving, real …
advanced technology that can provide various services including autonomous driving, real …
Provably secure mutual authentication and key agreement scheme using PUF in internet of drones deployments
Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles
(UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control …
(UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control …