Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of public-key cryptographic primitives in wireless sensor networks
KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
Key-aggregate cryptosystem for scalable data sharing in cloud storage
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage
The capability of selectively sharing encrypted data with different users via public cloud
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …
Vampire attacks: Draining life from wireless ad hoc sensor networks
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …
pervasive computing. Prior security work in this area has focused primarily on denial of …
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …
Verifiable searchable encryption with aggregate keys for data sharing system
In a secure data sharing system, the keyword search over encrypted files is a basic need of
a user with appropriate privileges. Although the traditional searchable encryption technique …
a user with appropriate privileges. Although the traditional searchable encryption technique …
A secure privacy-preserving data aggregation scheme based on bilinear ElGamal cryptosystem for remote health monitoring systems
Due to advancements in the development of wireless medical sensing devices and wireless
communication technologies, the wireless body area network (WBAN) has become an …
communication technologies, the wireless body area network (WBAN) has become an …
[کتاب][B] RFID and sensor networks: architectures, protocols, security, and integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …
EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
In this paper, we propose an efficient identity-based broadcast authentication scheme,
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …
EIBAS, to achieve security requirements in wireless sensor networks. To minimize …
Tinypairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks
Computing Bilinear Pairing on sensor platforms has become an important research topic
since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs) …
since the introduction of pairing-based cryptography to Wireless Sensor Networks (WSNs) …