Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A Review on the Use of Blockchain for the Internet of Things
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our
daily objects will be interconnected and will interact with their environment in order to collect …
daily objects will be interconnected and will interact with their environment in order to collect …
[PDF][PDF] Cryptography: a comparative analysis for modern techniques
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …
In many contemporary studies, researchers contributed towards identifying best …
Secure and privacy-aware blockchain design: Requirements, challenges and solutions
During the last decade, distributed ledger solutions such as blockchain have gained
significant attention due to their decentralized, immutable, and verifiable features. However …
significant attention due to their decentralized, immutable, and verifiable features. However …
ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …
compressed version of HTTP protocol that is used for communication between lightweight …
Blockchain-based IoT: A survey
Abstract Blockchain and Internet of Things (IoT), two of the top disruptive technologies, are
already on their way of resha** our future of the digital world, characterized by a drastic …
already on their way of resha** our future of the digital world, characterized by a drastic …
Creating a secure infrastructure for wireless diagnostics and software updates in vehicles
DK Nilsson, UE Larson, E Jonsson - International Conference on …, 2008 - Springer
A set of guidelines for creating a secure infrastructure for wireless diagnostics and software
updates in vehicles is presented. The guidelines are derived from a risk assessment for a …
updates in vehicles is presented. The guidelines are derived from a risk assessment for a …
Comparison studies between pre-shared and public key exchange mechanisms for transport layer security
FC Kuo, H Tschofenig, F Meyer… - … IEEE INFOCOM 2006 …, 2006 - ieeexplore.ieee.org
The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently
standardized by the IETF to extend the set of ciphersuites by utilizing existing key …
standardized by the IETF to extend the set of ciphersuites by utilizing existing key …
[หนังสือ][B] Handbook of wireless local area networks: applications, technology, security, and standards
M Ilyas, SA Ahson - 2005 - taylorfrancis.com
Consisting of 25 articles contributed by expert authors from around the world, this handbook
begins with a detailed introduction that provides an overview of LAN technologies …
begins with a detailed introduction that provides an overview of LAN technologies …
Phosphorus cluster production by laser ablation
Neutral and charged phosphorus clusters of a wide size range have been produced by
pulsed laser ablation (PLA) in vacuum at 532, 337, and 193 nm ablating wavelengths and …
pulsed laser ablation (PLA) in vacuum at 532, 337, and 193 nm ablating wavelengths and …
Changing dimensions of accountants' role and skill requirements in organisations: findings from the corporate sector in Bahrain
PL Joshi, WG Bremser - International Journal of Accounting …, 2004 - inderscienceonline.com
In a rapidly changing information technology environment, accountants' organisational roles
and skill requirements are also changing. This study examines the changing dimensions of …
and skill requirements are also changing. This study examines the changing dimensions of …