Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain-based caller-id authentication (bbca): A novel solution to prevent spoofing attacks in voip/sip networks
IM Tas, S Baktir - IEEE access, 2024 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification)
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …
spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller …
A survey on trends of two-factor authentication
D Tirfe, VK Anand - Contemporary Issues in Communication, Cloud and …, 2022 - Springer
The rapid increase of cybercriminals on identity theft and data breaches due to weak
authentication schemes, user's poor password management experience, and attacks such …
authentication schemes, user's poor password management experience, and attacks such …
An integrated fuzzy model for evaluation and selection of mobile banking (m-banking) applications using new fuzzy-BWM and fuzzy-TOPSIS
Mobile technology has revolutionised various business processes. Banking is one of them.
Traditional banking operations are gradually changing with the introduction of efficient …
Traditional banking operations are gradually changing with the introduction of efficient …
A fuzzy MCDM decision-making model for m-banking evaluations: comparing several m-banking applications
Mobile banking (m-banking) is one of the most recent creative banking channels that
provide many advantages to both consumers and financial institutions regarding banking …
provide many advantages to both consumers and financial institutions regarding banking …
Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services
OO Olakanmi, K Odeyemi - Computers & Security, 2021 - Elsevier
Mobile cloud computing (MCC) combines mobile devices with cloud computing for efficient
extension of infrastructures and cloud services to mobile devices using the existing mobile …
extension of infrastructures and cloud services to mobile devices using the existing mobile …
Auth4app: Protocols for identification and authentication using mobile applications
D Kreutz, R Fernandes, G Paz, T Jenuario… - Simpósio Brasileiro de …, 2020 - sol.sbc.org.br
The increasing adoption of mobile applications as a means of user authentication is
revealing new security challenges and opportunities. In order to modernize their physical …
revealing new security challenges and opportunities. In order to modernize their physical …
Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema
Mobile banking relies on the Internet for transfer data between the customer's device and
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …
bank, thereby making financial data vulnerable to theft unauthorized people. As such, a …
S3AS: uma Soluà § ã o de Autenticaà § ã oe Autorizaà § ã o atravé s de Aplicativos de Smartphones
R Fernandes, G Paz, D Kretuz… - … Argentina-Brasil de …, 2020 - revistas.setrem.com.br
A crescente utilizaà § ã o de aplicativos, especialmente em dispositivosmóveis, como
forma de autenticaà § ã o de usuá rios está trazendo à tona novasoportunidades e …
forma de autenticaà § ã o de usuá rios está trazendo à tona novasoportunidades e …
A study of two-way authentication for decentralized network identities
Y Lu, X Zhang, C Zhang, S Dai, P Ma… - 2022 14th International …, 2022 - ieeexplore.ieee.org
The rapid development of the Internet has posed a more serious challenge to
communication. The widely used authentication scheme is now a centralized authentication …
communication. The widely used authentication scheme is now a centralized authentication …
Smart card security mechanism with dynamic key
As a currently popular technology, the use of smart cards continues to increase in various
fields and the rapid development of technology. Therefore, data security stored on a smart …
fields and the rapid development of technology. Therefore, data security stored on a smart …