Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles with Lightweight Authentication
The Internet of Things (IoT) can be defined as the network of physical objects, or" things,"
embedded with sensors and software for processing and exchanging data with other …
embedded with sensors and software for processing and exchanging data with other …
Low Complexity Encoding Design for Fiber Optic Measurement While Drilling Communication System Based on Superposition Spinal Codes
X Yu, L Liang, K Jiang, T Chen, S Du - IEEE Access, 2024 - ieeexplore.ieee.org
Fiber optic communication while drilling can transmit downhole geological and engineering
parameter data at high speed, serving as a crucial component of intelligent drilling …
parameter data at high speed, serving as a crucial component of intelligent drilling …
[HTML][HTML] Design and Performance Analysis of a SPECK-Based Lightweight Hash Function
In recent years, hash algorithms have been used frequently in many areas, such as digital
signature, blockchain, and IoT applications. Standard cryptographic hash functions …
signature, blockchain, and IoT applications. Standard cryptographic hash functions …
[HTML][HTML] Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
A Sevin - Mathematics, 2025 - mdpi.com
The Internet of Things is used in many application areas in our daily lives. Ensuring the
security of valuable data transmitted over the Internet is a crucial challenge. Hash functions …
security of valuable data transmitted over the Internet is a crucial challenge. Hash functions …
[PDF][PDF] A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities
MN Alatawi - Int. J. Comput. Netw. Appl, 2023 - ijcna.org
The proliferation of sensor networks and other Internet of Things devices has prompted
growing privacy and safety concerns. These devices have very little memory, computing …
growing privacy and safety concerns. These devices have very little memory, computing …
Performance and Security Analysis of Lightweight Hash Functions in IoT
NF Mufidah, HH Nuha - Jurnal Informatika: Jurnal …, 2024 - ejournal.poltekharber.ac.id
The rapid proliferation of Internet of Things (IoT) devices across various sectors, including
healthcare, automotive, smart homes, and agriculture, has created a need for robust security …
healthcare, automotive, smart homes, and agriculture, has created a need for robust security …
Analysis on Success Factors for Improved User Search Through Comprehensive Locality Information
CG Charan, K Swaraj, D Gopichand… - … on Advances in …, 2024 - ieeexplore.ieee.org
An customized user-friendly website providing comprehensive information on hostels for
students attending colleges far from their hometowns. The website focuses on crucial details …
students attending colleges far from their hometowns. The website focuses on crucial details …
Um bloco de permutação para construções esponja: baseado na transformada do cosseno sobre corpos finitos de característica dois
LMR de Araújo, JB Lima… - Proceeding Series of …, 2025 - proceedings.sbmac.org.br
Neste trabalho, é proposto um novo bloco de permutação de comprimento (2+ n)× 32, em
que n é um número natural positivo, para utilização em construções esponja. Este bloco de …
que n é um número natural positivo, para utilização em construções esponja. Este bloco de …
Enhancing the Present Block Cipher for IoT Applications: Development and Comparative Analysis of a Lightweight Algorithm with Improved Key Schedule Algorithm
M Imdad - 2023 - search.proquest.com
Abstract The Internet of Things (IoT) has massive connectivity of resource-constrained
devices, and enormous data exchange between devices has made it susceptible to various …
devices, and enormous data exchange between devices has made it susceptible to various …
An Evaluation of Hashing and Other Applied Cryptography Algorithms
In the modern digital world, cryptography is critical in protecting personal statistics. Most of
the cryptography algorithms used to ease data, hashing, and other implemented …
the cryptography algorithms used to ease data, hashing, and other implemented …