Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
DssP: Efficient dual-server secret sharing protocol based on password authentication for cloud storage services
Ensuring the security of cloud storage services is an ongoing challenge, due to the
increasingly complex and dynamic threat landscape. One particular challenge is how to …
increasingly complex and dynamic threat landscape. One particular challenge is how to …
RETRACTED ARTICLE: Integrative optimization with Qos using multi-level security in medical cloud
V Jaikumar, K Venkatachalapathy - Journal of Ambient Intelligence and …, 2021 - Springer
Cloud environment improves the utilization of spread sources by sharing them with others in
an open platform. Security is an important concern, since, the data is being managed by …
an open platform. Security is an important concern, since, the data is being managed by …
Euler totient function and fermat Euler theorem based an optimized key management scheme for securing mobile agents migration
As the mobile agents move automatically on distributed networks, the security of agents and
platforms is of prime concern. Over the year's mobile agents-based software applications …
platforms is of prime concern. Over the year's mobile agents-based software applications …
Distributed secret sharing scheme based on the high-dimensional rotation paraboloid
S Qin, Z Tan, B Zhang, F Zhou - Journal of Information Security and …, 2021 - Elsevier
Secret sharing of (k, n)-threshold is naturally used to assist in security-assurance
applications in smart systems. It can ensure a high level of data security and reliability. Most …
applications in smart systems. It can ensure a high level of data security and reliability. Most …
[PDF][PDF] Bibliometric survey on zero-knowledge proof for authentication
A Pathak, T Patil, S Pawar, P Raut, S Khairnar… - Libr. Philos …, 2021 - academia.edu
ABSTRACT Background: Zero Knowledge Proof is a persuasive cryptographic protocol
employed to provide data security by kee** the user's identity, using the services …
employed to provide data security by kee** the user's identity, using the services …
Euler Totient Function and Fermat-Eulller Theorem Based on Optimized Key Management Scheme for Securing Mobile Agents Migration
As mobile agents move automatically on distributed networks, the security of agents and
platforms is of prime concern. Over the years, mobile agents-based software applications …
platforms is of prime concern. Over the years, mobile agents-based software applications …