Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage
The searchable encryption schemes (PEKS, IBEKS, and CLPEKS) based on public-key
cryptography (ie, PKI-based, Identity-based, and Certificateless) enable the data users to …
cryptography (ie, PKI-based, Identity-based, and Certificateless) enable the data users to …
BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare
Nowadays, smart healthcare and Electronic Health Record (EHR) play a significant role in
simplifying the experience of medical treatment and cuts down the trivial work of …
simplifying the experience of medical treatment and cuts down the trivial work of …
Certificateless Searchable Public Key Encryption with Trapdoor Indistinguishability for IoV
M Ma, B Chen, D Tang, M Deng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the development of the Internet of Vehicles (IoV), data sharing as a key service for most
IoV applications has emerged as an effective way to break down data silos and unlock the …
IoV applications has emerged as an effective way to break down data silos and unlock the …
Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System.
Y Sun, X Du, S Niu, X Yang - CMES-Computer Modeling in …, 2024 - search.ebscohost.com
Traditional email systems can only achieve one-way communication, which means only the
receiver is allowed to search for emails on the email server. In this paper, we propose a …
receiver is allowed to search for emails on the email server. In this paper, we propose a …
Secure-channel free certificateless searchable public key authenticated encryption with keyword search
Abstract Public-key Authenticated Encryption with Keyword Search (PAEKS) is a
cryptographic primitive that can resist inside keyword guessing attack (KGA). However, most …
cryptographic primitive that can resist inside keyword guessing attack (KGA). However, most …
A Fast and Accurate Non-interactive Privacy-Preserving Neural Network Inference Framework
H Tao, C Xu, P Zhang - International Conference on Testbeds and …, 2023 - Springer
With the remarkable successes of machine learning, it is becoming increasingly popular and
widespread. Machine learning as a Service (MLaaS) provided by cloud services is widely …
widespread. Machine learning as a Service (MLaaS) provided by cloud services is widely …
CLEAN: Cloud-enabled Scalable Blockchain Outsourcing System Using Dynamic Programming
Blockchain technology has garnered significant attention in academic and industrial
domains due to its ability to establish a secure and trustworthy environment. As blockchain …
domains due to its ability to establish a secure and trustworthy environment. As blockchain …
A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability
Nowadays, users often opt to encrypt their sensitive data before outsourcing it to the cloud.
While this encryption ensures data privacy, it compromises the search functionality. Public …
While this encryption ensures data privacy, it compromises the search functionality. Public …
Operating system network security enhancement scheme based on trusted storage
L Qi, X Lv, L Sun, T Yao, J Yu… - … and Converged Networks, 2023 - ieeexplore.ieee.org
Data storage security has become the core of many network security issues. In order to
achieve trusted storage and trusted measurement of network community data, this paper …
achieve trusted storage and trusted measurement of network community data, this paper …