Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A practical fog-based privacy-preserving online car-hailing service system
Aiming for minimizing passengers' waiting time and vehicles' vacancy rate, online car-
hailing service systems with fog computing has been deployed in various scenarios. In this …
hailing service systems with fog computing has been deployed in various scenarios. In this …
A secure data self-destructing scheme in cloud computing
With the rapid development of versatile cloud services, it becomes increasingly susceptible
to use cloud services to share data in a friend circle in the cloud computing environment …
to use cloud services to share data in a friend circle in the cloud computing environment …
Knowledge mining in cybersecurity: From attack to defense
In the fast-evolving world of Cybersecurity, an analyst often has the difficult task of
responding to new threats and attack campaigns within a limited amount of time. If an …
responding to new threats and attack campaigns within a limited amount of time. If an …
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
Revocation and key evolving paradigms are central issues in cryptography, and in PKI in
particular. A novel concern related to these areas was raised in the recent work of Sahai …
particular. A novel concern related to these areas was raised in the recent work of Sahai …
Decentralized privacy-preserving timed execution in blockchain-based smart contract platforms
Timed transaction execution is critical for various decentralized privacy-preserving
applications powered by blockchain-based smart contract platforms. Such privacy …
applications powered by blockchain-based smart contract platforms. Such privacy …
Decentralized release of self-emerging data using smart contracts
In the age of Big Data, releasing protected sensitive data at a future point in time is critical for
various applications. Such self-emerging data release requires the data to be protected until …
various applications. Such self-emerging data release requires the data to be protected until …
Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things
To ensure the normal work of the whole system in the context of the Internet of Things (IoT),
remote attestation for each smart device should be guaranteed. However, considering the …
remote attestation for each smart device should be guaranteed. However, considering the …
Attribute-based encryption for range attributes
Attribute-Based Encryption (ABE) is an advanced form of public-key encryption where
access control mechanisms based on attributes and policies are possible. In conventional …
access control mechanisms based on attributes and policies are possible. In conventional …
Socioty: Practical cryptography in smart home contexts
Smartphones form an important source of trust in modern computing. But, while their mobility
is convenient, smartphones can be stolen or seized, allowing an adversary to impersonate …
is convenient, smartphones can be stolen or seized, allowing an adversary to impersonate …
Securing blockchain-based timed data release against adversarial attacks
J Wang, B Palanisamy - Journal of Computer Security, 2023 - journals.sagepub.com
Timed data release refers to protecting sensitive data that can be accessed only after a pre-
determined amount of time has passed. While blockchain-based solutions for timed data …
determined amount of time has passed. While blockchain-based solutions for timed data …