Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
Wireless communication based cloud network architecture using AI assisted with IoT for FinTech application
Financial Technology has revolutionized the delivery and usage of the autonomous
operations and processes to improve the financial services. Banks and Financial institutions …
operations and processes to improve the financial services. Banks and Financial institutions …
[HTML][HTML] An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
Smart grid (SG) provides a suitable adjustment in the amount of power generation by
providing the ability to supervise consumer behavior. SG uses in the smart system to …
providing the ability to supervise consumer behavior. SG uses in the smart system to …
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system
K Ma, G Song, Y Zhou, R Xu, B Yang - Computer Standards & Interfaces, 2024 - Elsevier
In recent years, due to the spread of infectious diseases such as COVID-19, people begin to
use the electronic medical system to obtain remote diagnosis and treatment services, which …
use the electronic medical system to obtain remote diagnosis and treatment services, which …
[PDF][PDF] RAVCC: robust authentication protocol for RFID based vehicular cloud computing
Vehicular cloud computing (VCC) stands for vehicle cloud computing, which combines
cloud, vehicular networking, and Internet of Things (IoT) and related technologies. VCC is …
cloud, vehicular networking, and Internet of Things (IoT) and related technologies. VCC is …
A secure user authentication protocol using elliptic curve cryptography
Authentication is a significant security prerequisite for secure communications. However,
most of identity assisted mutual authentication protocols are requiring of security verification …
most of identity assisted mutual authentication protocols are requiring of security verification …
Cloud-based authenticated protocol for healthcare monitoring system
In this paper, we have developed cloud-based authentication protocol for e-health care
monitoring system which provides a secure platform to the patients. By using this system, the …
monitoring system which provides a secure platform to the patients. By using this system, the …
Fuzzy rule based intelligent system for user authentication based on user behaviour
Security of the data is one of the major concerns now a days. To secure data text–based
authentication vulnerable to attacks like shoulder surfing, hidden cameras and hackers. To …
authentication vulnerable to attacks like shoulder surfing, hidden cameras and hackers. To …
Security and privacy technique in big data: A review
J Khan, N Ahmad - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
A new issue has arisen since the volume of data is constantly increasing and cannot be
solved by conventional analytic methods. Therefore, a new paradigm known as Big Data …
solved by conventional analytic methods. Therefore, a new paradigm known as Big Data …