Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
In-memory computing with resistive switching devices
Modern computers are based on the von Neumann architecture in which computation and
storage are physically separated: data are fetched from the memory unit, shuttled to the …
storage are physically separated: data are fetched from the memory unit, shuttled to the …
Tunable stochastic memristors for energy-efficient encryption and computing
Abstract Information security and computing, two critical technological challenges for post-
digital computation, pose opposing requirements–security (encryption) requires a source of …
digital computation, pose opposing requirements–security (encryption) requires a source of …
IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …
including personal health care, environmental monitoring, home automation, smart mobility …
Structural color materials for optical anticounterfeiting
W Hong, Z Yuan, X Chen - Small, 2020 - Wiley Online Library
The counterfeiting of goods is growing worldwide, affecting practically any marketable item
ranging from consumer goods to human health. Anticounterfeiting is essential for …
ranging from consumer goods to human health. Anticounterfeiting is essential for …
Halide perovskite memristors as flexible and reconfigurable physical unclonable functions
Abstract Physical Unclonable Functions (PUFs) address the inherent limitations of
conventional hardware security solutions in edge-computing devices. Despite impressive …
conventional hardware security solutions in edge-computing devices. Despite impressive …
Inkjet-printed unclonable quantum dot fluorescent anti-counterfeiting labels with artificial intelligence authentication
An ideal anti-counterfeiting technique has to be inexpensive, mass-producible,
nondestructive, unclonable and convenient for authentication. Although many anti …
nondestructive, unclonable and convenient for authentication. Although many anti …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …
controlling and monitoring of the connected smart objects. IoT applications range over a …
A survey of physical-layer authentication in wireless communications
N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
healthcare systems more efficient than before. Modern healthcare devices can monitor and …