Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on methods and challenges in EEG based authentication
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
which are the results of synaptic activations of the brain's neurons. In recent years, it has …
A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things
Over the last decade, with the increasing popularity and usage of the internet of things
worldwide, Internet of Medical Things (IoMT) has emerged as a key technology of the …
worldwide, Internet of Medical Things (IoMT) has emerged as a key technology of the …
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
Secure and lightweight user authentication scheme for cloud-assisted Internet of Things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …
progressive development of the Internet of Things (IoT) has motivated medical and health …
TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks
If all vehicles are connected together through a wireless communication channel, vehicular
ad hoc networks (VANETs) can support a wide range of real-time traffic information services …
ad hoc networks (VANETs) can support a wide range of real-time traffic information services …