Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy-preserving content dissemination for vehicular social networks: Challenges and solutions
Vehicular social networks (VSNs), viewed as the integration of traditional vehicular networks
and social networks, are promising communication platforms based on the development of …
and social networks, are promising communication platforms based on the development of …
Towards dependably detecting geolocation of cloud servers
Every physical data center is located somewhere on the globe. A cloud service can be
delivered from a set of data centers in several locations, depending on their workload …
delivered from a set of data centers in several locations, depending on their workload …
[HTML][HTML] SAM-PAY: A Location-Based Authentication Method for Mobile Environments
DG Berbecaru - Electronics, 2025 - mdpi.com
Wireless, satellite, and mobile networks are increasingly used in application scenarios to
provide advanced services to mobile or nomadic devices. For example, to authenticate …
provide advanced services to mobile or nomadic devices. For example, to authenticate …
Server location verification (SLV) and server location pinning: Augmenting TLS authentication
We introduce the first known mechanism providing realtime server location verification. Its
uses include enhancing server authentication by enabling browsers to automatically …
uses include enhancing server authentication by enabling browsers to automatically …
Towards sustainable evolution for the TLS public-key infrastructure
Motivated by the weaknesses of today's TLS public-key infrastructure (PKI), recent studies
have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one …
have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one …
An Innovative Authentication Model for the Enhancement of Cloud Security
Cloud computing provides different types of services deployed in different models; thus, its
security has become a paramount concern in the IT field. In this paper, a conceptual …
security has become a paramount concern in the IT field. In this paper, a conceptual …
Survey of cloud server geolocating techniques
L Hippelainen, I Oliver, S Lai - 2016 19th Conference of Open …, 2016 - ieeexplore.ieee.org
Every cloud data center has a geographical location, which is known to, at least, its owner.
Still, it is a challenge for a cloud customer to discover indisputably the location of the data …
Still, it is a challenge for a cloud customer to discover indisputably the location of the data …
EVLA: Extended-Validation Certificates with Location Assurance
P Szalachowski - Proceedings of the 2019 ACM International …, 2019 - dl.acm.org
Transport Layer Security (TLS) is a de facto standard for secure communication over the
Internet and other critical infrastructures. The trust model deployed in the TLS is based on …
Internet and other critical infrastructures. The trust model deployed in the TLS is based on …
Exploring website location as a security indicator
Authenticating websites is an ongoing problem for users. Recent proposals have suggested
strengthening current server authentication methods by incorporating website location as a …
strengthening current server authentication methods by incorporating website location as a …
Strengthening Authentication and Integrity in Web Applications
N Karapanos - 2018 - research-collection.ethz.ch
Web applications have become one of the most common ways of providing access to online
information and services. People use their desktop or mobile browsers to surf the web and …
information and services. People use their desktop or mobile browsers to surf the web and …