Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …
(VANETs). Today car manufacturers have already started to equip vehicles with …
A security and privacy review of VANETs
Vehicular ad hoc networks (VANETs) have stimulated interest in both academic and industry
settings because, once deployed, they would bring a new driving experience to drivers …
settings because, once deployed, they would bring a new driving experience to drivers …
Provably secure authenticated key agreement scheme for smart grid
Due to the rapid development of wireless communication systems, authentication becomes
a key security component in smart grid environments. Authentication then plays an important …
a key security component in smart grid environments. Authentication then plays an important …
Secure-enhanced federated learning for AI-empowered electric vehicle energy prediction
Although AI-empowered schemes bring some sound solutions to stimulate more reasonable
energy distribution schemes between charging stations (CSs) and CS providers, frequent …
energy distribution schemes between charging stations (CSs) and CS providers, frequent …
Secure anonymous key distribution scheme for smart grid
JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid
domains, how to establish secure communication sessions has become an important issue …
domains, how to establish secure communication sessions has become an important issue …
Achieving secure role-based access control on encrypted data in cloud storage
L Zhou, V Varadharajan… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
With the rapid developments occurring in cloud computing and services, there has been a
growing trend to use the cloud for large-scale data storage. This has raised the important …
growing trend to use the cloud for large-scale data storage. This has raised the important …
[HTML][HTML] A comprehensive survey on security and privacy for electronic health data
Recently, the integration of state-of-the-art technologies, such as modern sensors, networks,
and cloud computing, has revolutionized the conventional healthcare system. However …
and cloud computing, has revolutionized the conventional healthcare system. However …
GSIS: A secure and privacy-preserving protocol for vehicular communications
In this paper, we first identify some unique design requirements in the aspects of security
and privacy preservation for communications between different communication devices in …
and privacy preservation for communications between different communication devices in …
Proposing a secure RPL based internet of things routing protocol: a review
Abstract Nowadays, the Internet of Things (IoT) research domain attracts the researchers,
due to its extensive collection of applications and ease in deploying in several domains of …
due to its extensive collection of applications and ease in deploying in several domains of …