Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Lightweight authentication protocol for connected medical IoT through privacy-preserving access
With the rapid progress of communication technology, the Internet of Things (IoT) has
emerged as an essential element in our daily lives. Given that the IoT encompasses diverse …
emerged as an essential element in our daily lives. Given that the IoT encompasses diverse …
Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism
Abstract As the Internet of Things (IoT) continues its rapid expansion, cloud computing has
become integral to various smart healthcare applications. However, the proliferation of …
become integral to various smart healthcare applications. However, the proliferation of …
[HTML][HTML] RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
The rapid expansion of Mobile Edge Computing (MEC) and the Internet of Things (IoT) has
revolutionized technology by enabling real-time data processing at the network edge, which …
revolutionized technology by enabling real-time data processing at the network edge, which …
RAP-MEC: Robust authentication protocol for the mobile edge computing services
The emergence of edge computing has revolutionized the landscape of modern
applications, offering remarkable advantages such as low-latency and high-bandwidth …
applications, offering remarkable advantages such as low-latency and high-bandwidth …
PSAF-IoT: Physically secure authentication framework for the Internet of Things
The Internet of Things (IoT) revolutionizes connectivity, as IoT devices grow exponentially,
vulnerabilities emerge, ranging from data breaches to device hijacking. Thus there is the …
vulnerabilities emerge, ranging from data breaches to device hijacking. Thus there is the …
Secure and efficient biometric-based anonymous authentication scheme for mobile-edge computing
Q Zhu, L You, G Hu, S Wang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Currently, the biometric-based authentication schemes have been widely deployed in the
mobile edge computing environment to ensure the authenticity of the edge nodes' identities …
mobile edge computing environment to ensure the authenticity of the edge nodes' identities …
RLBA-UAV: A Robust and Lightweight Blockchain-Based Authentication and Key Agreement Scheme for PUF-Enabled UAVs
Unmanned aerial vehicles (UAVs) integrated with the internet of things (IoT) guarantee
useful advantages such as facilitating ground communications in regions where the …
useful advantages such as facilitating ground communications in regions where the …
REHAS: Robust and Efficient Hyperelliptic Curve‐Based Authentication Scheme for Internet of Drones
B Pratap, A Singh, PS Mehra - Concurrency and Computation …, 2025 - Wiley Online Library
ABSTRACT Internet of Drones (IoD) is one of the most beneficial and has many versatile
applications like Surveillance and Security, Delivery and Logistics, Environmental …
applications like Surveillance and Security, Delivery and Logistics, Environmental …
[HTML][HTML] A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones
J Choi, S Son, D Kwon, Y Park - Sensors, 2025 - mdpi.com
The Internet of Drones (IoD) is an emerging industry that offers convenient services for
humans due to the high mobility and flexibility of drones. The IoD substantially enhances …
humans due to the high mobility and flexibility of drones. The IoD substantially enhances …
[HTML][HTML] Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing
exceptional capabilities and efficiencies. As UAVs become increasingly integrated into …
exceptional capabilities and efficiencies. As UAVs become increasingly integrated into …