Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An identity-based security system for user privacy in vehicular ad hoc networks
Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus
deserves deployment effort. Attacking and misusing such network could cause destructive …
deserves deployment effort. Attacking and misusing such network could cause destructive …
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Node compromise is a serious threat to wireless sensor networks deployed in unattended
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …
Secure and efficient data communication protocol for wireless body area networks
Wireless Body Area Networks (WBANs) are expected to play a major role in the field of
patient-health monitoring in the near future, which gains tremendous attention amongst …
patient-health monitoring in the near future, which gains tremendous attention amongst …
Body area network security: a fuzzy attribute-based signcryption scheme
Body Area Networks (BANs) are expected to play a major role in the field of patient-health
monitoring in the near future. While it is vital to support secure BAN access to address the …
monitoring in the near future. While it is vital to support secure BAN access to address the …
On broadcast authentication in wireless sensor networks
Broadcast authentication is a critical security service in wireless sensor networks (WSNs),
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …
MDPA: multidimensional privacy‐preserving aggregation scheme for wireless sensor networks
In this paper, we propose a novel multidimensional privacy‐preserving data aggregation
scheme for improving security and saving energy consumption in wireless sensor networks …
scheme for improving security and saving energy consumption in wireless sensor networks …
A pairing-based user authentication scheme for wireless clients with smart cards
YM Tseng, TY Wu, JD Wu - Informatica, 2008 - content.iospress.com
With rapid growth of mobile wireless networks, handheld devices are popularly used by
people and many mobile applications have been rapidly developed. Considering the limited …
people and many mobile applications have been rapidly developed. Considering the limited …
High efficient key-insulated attribute based encryption scheme without bilinear pairing operations
H Hong, Z Sun - SpringerPlus, 2016 - Springer
Attribute based encryption (ABE) has been widely applied for secure data protection in
various data sharing systems. However, the efficiency of existing ABE schemes is not high …
various data sharing systems. However, the efficiency of existing ABE schemes is not high …
A secure authentication and billing architecture for wireless mesh networks
Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for
ubiquitous high-speed network access. While much effort has been made to address issues …
ubiquitous high-speed network access. While much effort has been made to address issues …
ECS‐CP‐ABE: A lightweight elliptic curve signcryption scheme based on ciphertext‐policy attribute‐based encryption to secure downlink multicast communication in …
As an integral part of the smart grid, advanced metering infrastructure (AMI) implements two‐
way communication to enable the smart grid achieving the desired performance …
way communication to enable the smart grid achieving the desired performance …