Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A dynamic secure group sharing framework in public cloud computing
K Xue, P Hong - IEEE Transactions on Cloud Computing, 2014 - ieeexplore.ieee.org
With the popularity of group data sharing in public cloud computing, the privacy and security
of group sharing data have become two major issues. The cloud provider cannot be treated …
of group sharing data have become two major issues. The cloud provider cannot be treated …
A proxy signature-based swarm drone authentication with leader selection in 5G networks
Drones are imperative for the 5G architecture as a mobile source to expand network
coverage and support seamless services, particularly through enabling device-to-device …
coverage and support seamless services, particularly through enabling device-to-device …
Multilevel Subgranting by Power of Attorney and OAuth Authorization Server in Cyber–Physical Systems
Many cyber–physical systems (CPSs) are today semi-autonomous and powerful enough to
perform advanced tasks on their own. This means they can also act as representatives of …
perform advanced tasks on their own. This means they can also act as representatives of …
A proxy signature-based drone authentication in 5G D2D networks
5G is the beginning of a new era in cellular communication, bringing up a highly connected
network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT …
network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT …
Certificateless multi-proxy signature
Z **, Q Wen - Computer Communications, 2011 - Elsevier
Multi-proxy signature is a scheme that an original signer authorizes a proxy group as his
proxy agent and later only the cooperation of all proxy signers in the proxy group could sign …
proxy agent and later only the cooperation of all proxy signers in the proxy group could sign …
[BUCH][B] Introduction to cryptography
Electronic communication and financial transactions have assumed massive proportions
today. But they come with high risks. Achieving cyber security has become a top priority, and …
today. But they come with high risks. Achieving cyber security has become a top priority, and …
[HTML][HTML] A novel proxy signature scheme based on user hierarchical access control policy
AK Das, A Massand, S Patil - Journal of King Saud University-Computer …, 2013 - Elsevier
In this paper, we propose a new security protocol for proxy signature by a hierarchy of proxy
signers. In this protocol, the original signer delegates his/her signing capability to a …
signers. In this protocol, the original signer delegates his/her signing capability to a …
UAV-based privacy-preserved trustworthy seamless service agility for NextG cellular networks
Next Generation cellular networks are expected to offer better service quality, secure and
reliable service provisioning, and more cooperative operation even in unexpected stressful …
reliable service provisioning, and more cooperative operation even in unexpected stressful …
A batch verification for multiple proxy signature
In this article, we proposed a batch verification scheme for multiple proxy signatures to
reduce the proxy signature verification time. The proposed scheme is not only efficient …
reduce the proxy signature verification time. The proposed scheme is not only efficient …
Efficient authentication of drones to mmWave wireless mesh networks in post-disaster scenarios
Unmanned Aerial Vehicles (UAVs), or drones, are increasingly being utilized for public
safety circumstances including post-disaster recovery of destroyed communication …
safety circumstances including post-disaster recovery of destroyed communication …