Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Recent advances in smart contracts: A technical overview and state of the art
Smart contracts, as an added functionality to blockchain, have received increased attention
recently. They are executable programs whose instance and state are stored in blockchain …
recently. They are executable programs whose instance and state are stored in blockchain …
Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends
Scalable and secure authorization of smart things is of the crucial essence for the successful
deployment of the Internet of Things (IoT). Unauthorized access to smart things could …
deployment of the Internet of Things (IoT). Unauthorized access to smart things could …
End-to-end encryption in resource-constrained IoT device
ASD Alluhaidan, P Prabu - IEEE access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technologies will interconnect with a wide range of network devices,
regardless of their local network and resource capacities. Ensuring the security …
regardless of their local network and resource capacities. Ensuring the security …
Sigstore: Software signing for everybody
Software supply chain compromises are on the rise. From the effects of XCodeGhost to
SolarWinds, hackers have identified that targeting weak points in the supply chain allows …
SolarWinds, hackers have identified that targeting weak points in the supply chain allows …
A lightweight privacy-preserving communication protocol for heterogeneous IoT environment
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
Merkle2: A Low-Latency Transparency Log System
Y Hu, K Hooshmand, H Kalidhindi… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Transparency logs are designed to help users audit untrusted servers. For example,
Certificate Transparency (CT) enables users to detect when a compromised Certificate …
Certificate Transparency (CT) enables users to detect when a compromised Certificate …
{WAVE}: A decentralized authorization framework with transitive delegation
Most deployed authorization systems rely on a central trusted service whose compromise
can lead to the breach of millions of user accounts and permissions. We present WAVE, an …
can lead to the breach of millions of user accounts and permissions. We present WAVE, an …
OST: On-demand TSCH scheduling with traffic-awareness
As the emerging Internet of Things (IoT) devices and applications flourish, demand for
reliable and energy-efficient low-power wireless network protocols is surging. For this …
reliable and energy-efficient low-power wireless network protocols is surging. For this …
Data management for future wireless networks: Architecture, privacy preservation, and regulation
Next-generation wireless networks (NGWN) aim to support diversified smart applications
that require frequent data exchanges and collaborative data processing among multiple …
that require frequent data exchanges and collaborative data processing among multiple …
Mqtt-i: Achieving end-to-end data flow integrity in mqtt
F Buccafurri, V De Angelis… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
MQTT has become the de facto standard in the IoT. Although standard MQTT lacks built-in
security features, several proposals have been made to address this gap. Unfortunately, no …
security features, several proposals have been made to address this gap. Unfortunately, no …