Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of Layer-two blockchain protocols
A Gangwal, HR Gangavalli, A Thirupathi - Journal of Network and …, 2023 - Elsevier
After the success of the Bitcoin blockchain, came several cryptocurrencies and blockchain
solutions in the last decade. Nonetheless, Blockchain-based systems still suffer from low …
solutions in the last decade. Nonetheless, Blockchain-based systems still suffer from low …
Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Sok: Layer-two blockchain protocols
Blockchains have the potential to revolutionize markets and services. However, they
currently exhibit high latencies and fail to handle transaction loads comparable to those …
currently exhibit high latencies and fail to handle transaction loads comparable to those …
Design choices for central bank digital currency: Policy and technical considerations
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Platypus: A central bank digital currency with unlinkable transactions and privacy-preserving regulation
Due to the popularity of blockchain-based cryptocurrencies, the increasing digitalization of
payments, and the constantly reducing role of cash in society, central banks have shown an …
payments, and the constantly reducing role of cash in society, central banks have shown an …
Pantheon: Private retrieval from public key-value store
Consider a cloud server that owns a key-value store and provides a private query service to
its clients. Preserving client privacy in this setting is difficult because the key-value store is …
its clients. Preserving client privacy in this setting is difficult because the key-value store is …
Oblivious message retrieval
Anonymous message delivery systems, such as private messaging services and privacy-
preserving payment systems, need a mechanism for recipients to retrieve the messages …
preserving payment systems, need a mechanism for recipients to retrieve the messages …
Reducing participation costs via incremental verification for ledger systems
Ledger systems are applications run on peer-to-peer networks that provide strong integrity
guarantees. However, these systems often have high participation costs. For a server to join …
guarantees. However, these systems often have high participation costs. For a server to join …
Sok: A systematic review of tee usage for develo** trusted applications
A Paju, MO Javed, J Nurmi, J Savimäki… - Proceedings of the 18th …, 2023 - dl.acm.org
Trusted Execution Environments (TEEs) are a feature of modern central processing units
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
(CPUs) that aim to provide a high assurance, isolated environment in which to run …
Scalable private signaling
Private messaging systems that use a bulletin board, like privacy-preserving blockchains,
have been a popular topic during the last couple of years. In these systems, typically a …
have been a popular topic during the last couple of years. In these systems, typically a …