Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Systematic and critical review of rsa based public key cryptographic schemes: Past and present status
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …
unauthorized access. Advancement in technologies and new innovative methods applied by …
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems
SA Latif, FBX Wen, C Iwendi, FW Li-Li… - Computer …, 2022 - Elsevier
Internet of things (IoT) is one of the most emerging technologies nowadays and it is one of
the key enablers of industrial cyber physical system (CPSs). It has started to participate in …
the key enablers of industrial cyber physical system (CPSs). It has started to participate in …
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and
government agencies. They harm internet businesses, limit access to information and …
government agencies. They harm internet businesses, limit access to information and …
Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks
Abstract The Internet of Things (IoT), considered an intriguing technology with substantial
potential for tackling many societal concerns, has been develo** into a significant …
potential for tackling many societal concerns, has been develo** into a significant …
An effective and enhanced RSA based public key encryption scheme (XRSA)
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …
confidentiality, authentication, and integrity. These services are essentially more important in …
An improved public key cryptographic algorithm based on chebyshev polynomials and RSA
C Zhang, Y Liang, A Tavares, L Wang, T Gomes… - Symmetry, 2024 - mdpi.com
Due to its very desirable properties, Chebyshev polynomials are often used in the design of
public key cryptographic systems. This paper discretizes the Chebyshev map** …
public key cryptographic systems. This paper discretizes the Chebyshev map** …
A review of the present cryptographic arsenal to deal with post-quantum threats
The looming threat of quantum attacks on the digital infrastructure protected by conventional
cryptographic protocol has generated urgency in identifying and deploying …
cryptographic protocol has generated urgency in identifying and deploying …
[PDF][PDF] Revolutionizing modern networks: advances in AI, machine learning, and blockchain for quantum satellites and UAV-based communication
Quantum communication is the most secure technique of transmitting data available today.
Fiber communication lines and satellite-to-ground links have served as the basis for the …
Fiber communication lines and satellite-to-ground links have served as the basis for the …
[HTML][HTML] An enhanced learning with error-based cryptosystem: A lightweight quantum-secure cryptography method
Quantum-secure cryptography is a dynamic field due to its crucial role in various domains.
This field aligns with the ongoing efforts in data security. Post-quantum encryption (PQE) …
This field aligns with the ongoing efforts in data security. Post-quantum encryption (PQE) …