Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
A systematic security assessment and review of internet of things in the context of authentication
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …
deployed for collecting sensitive data to be used in critical applications. The drones transmit …
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things
With the widespread utilization of Internet-enabled smart devices (SDs), the Industrial
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …
Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets
Vehicles authentication, the integrity of messages exchanged, and privacy-preserving are
essential features in vehicular ad hoc network (VANETs) security. Most of the previously …
essential features in vehicular ad hoc network (VANETs) security. Most of the previously …
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
M Shuai, L **ong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …
on solving special requirements in industrial applications. In IIoT environments, remote …
LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the
resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT …
resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT …
A lightweight secure user authentication and key agreement protocol for wireless sensor networks
J Mo, H Chen - Security and Communication Networks, 2019 - Wiley Online Library
Wireless sensor networks (WSNs) have great potential for numerous domains of application
because of their ability to sense and understand unattended environments. However, a …
because of their ability to sense and understand unattended environments. However, a …