Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain—Internet of Things applications: Opportunities and challenges for industry 4.0 and society 5.0
Today, blockchain is becoming more popular in academia and industry because it is a
distributed, decentralised technology which is changing many industries in terms of security …
distributed, decentralised technology which is changing many industries in terms of security …
[HTML][HTML] Citizens' data privacy in China: The state of the art of the Personal Information Protection Law (PIPL)
I Calzada - Smart Cities, 2022 - mdpi.com
The Personal Information Protection Law (PIPL) was launched on 1 November 2021 in
China. This article provides a state-of-the-art review of PIPL through a policy analysis. This …
China. This article provides a state-of-the-art review of PIPL through a policy analysis. This …
[HTML][HTML] A new blockchain-based authentication framework for secure IoT networks
Most current research on decentralized IoT applications focuses on a specific vulnerability.
However, for IoT applications, only a limited number of techniques are dedicated to handling …
However, for IoT applications, only a limited number of techniques are dedicated to handling …
P2B-Trace: Privacy-Preserving Blockchain-based Contact Tracing to Combat Pandemics
The eruption of a pandemic, such as COVID-19, can cause an unprecedented global crisis.
Contact tracing, as a pillar of communicable disease control in public health for decades …
Contact tracing, as a pillar of communicable disease control in public health for decades …
A comprehensive analysis of privacy protection techniques developed for COVID-19 pandemic
A Majeed, SO Hwang - IEEE Access, 2021 - ieeexplore.ieee.org
Since the emergence of coronavirus disease–2019 (COVID-19) outbreak, every country has
implemented digital solutions in the form of mobile applications, web-based frameworks …
implemented digital solutions in the form of mobile applications, web-based frameworks …
[HTML][HTML] Security of a PUF mutual authentication and session key establishment protocol for IoT devices
DZ Sun, Y Tian - Mathematics, 2022 - mdpi.com
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual
authentication and session key establishment protocol for IoT (Internet of Things) devices …
authentication and session key establishment protocol for IoT (Internet of Things) devices …
Comparing Efficiency and Performance of IoT BLE and RFID-Based Systems for Achieving Contact Tracing to Monitor Infection Spread among Hospital and Office …
COVID-19 is highly contagious and spreads rapidly; it can be transmitted through coughing
or contact with virus-contaminated hands, surfaces, or objects. The virus spreads faster …
or contact with virus-contaminated hands, surfaces, or objects. The virus spreads faster …
Securing Fog Computing Through Consortium Blockchain Integration: The Proof of Enhanced Concept (PoEC) Approach
The authors have developed an innovative topology by amalgamating consortium
blockchain, often referred to as supervisory blockchain, with fog computing. The proposed …
blockchain, often referred to as supervisory blockchain, with fog computing. The proposed …
High-performance BFT consensus for Metaverse through block linking and shortcut loop
In recent years, the Metaverse has captured increasing attention. As the foundational
technologies for these digital realms, blockchain systems and their critical component–the …
technologies for these digital realms, blockchain systems and their critical component–the …
FedCTQ: A Federated-Based Framework for Accurate and Efficient Contact Tracing Query
Contact tracing query (CTQ) plays a crucial role in the prevention of epidemic diseases. In
real-world applications, user trajectory, encompassing a wealth of sensitive information, is …
real-world applications, user trajectory, encompassing a wealth of sensitive information, is …