Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trust management of services in cloud environments: Obstacles and solutions
Trust management is one of the most challenging issues in the emerging cloud computing
area. Over the past few years, many studies have proposed different techniques to address …
area. Over the past few years, many studies have proposed different techniques to address …
How close are we to realizing a pragmatic VANET solution? A meta-survey
Vehicular Ad-hoc Networks (VANETs) are seen as the key enabling technology of Intelligent
Transportation Systems (ITS). In addition to safety, VANETs also provide a cost-effective …
Transportation Systems (ITS). In addition to safety, VANETs also provide a cost-effective …
RBAC-SC: Role-based access control using smart contract
The role-based access control (RBAC) framework is a mechanism that describes the access
control principle. As a common interaction, an organization provides a service to a user who …
control principle. As a common interaction, an organization provides a service to a user who …
Design choices for central bank digital currency: Policy and technical considerations
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
A data-oriented (and beyond) network architecture
T Koponen, M Chawla, BG Chun… - Proceedings of the …, 2007 - dl.acm.org
The Internet has evolved greatly from its original incarnation. For instance, the vast majority
of current Internet usage is data retrieval and service access, whereas the architecture was …
of current Internet usage is data retrieval and service access, whereas the architecture was …
Oceanstore: An architecture for global-scale persistent storage
OceanStore is a utility infrastructure designed to span the globe and provide continuous
access to persistent information. Since this infrastructure is comprised of untrusted servers …
access to persistent information. Since this infrastructure is comprised of untrusted servers …
Overcoming security challenges in microservice architectures
The microservice architectural style is an emerging trend in software engineering that allows
building highly scalable and flexible systems. However, current state of the art provides only …
building highly scalable and flexible systems. However, current state of the art provides only …
Design and implementation of the idemix anonymous credential system
J Camenisch, E Van Herreweghen - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and
accountable transactions between users and service providers. As such, they represent a …
accountable transactions between users and service providers. As such, they represent a …
SoK: secure messaging
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …
many solutions now claim to offer secure and private messaging. This includes both a large …
A survey of autonomic communications
Autonomic communications seek to improve the ability of network and services to cope with
unpredicted change, including changes in topology, load, task, the physical and logical …
unpredicted change, including changes in topology, load, task, the physical and logical …