Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Robustness, security and privacy in location-based services for future IoT: A survey
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …
exchanging information. Location information is one of the most crucial pieces of information …
[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …
An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …
A PUF-based secure communication protocol for IoT
Security features are of paramount importance for the Internet of Things (IoT), and
implementations are challenging given the resource-constrained IoT setup. We have …
implementations are challenging given the resource-constrained IoT setup. We have …
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
With the rapid development of device-to-device and machine-to-machine communication,
there is an exponential increase in the usage of various smart applications, such as …
there is an exponential increase in the usage of various smart applications, such as …
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
In this paper we propose Sancus, a security architecture for networked embedded devices.
Sancus supports extensibility in the form of remote (even third-party) software installation on …
Sancus supports extensibility in the form of remote (even third-party) software installation on …
Sancus 2.0: A low-cost security architecture for iot devices
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …
the USENIX Security conference. It supports remote (even third-party) software installation …
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …
Communication Technology) links any physical objects to the internet to perform information …
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …