Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security in fog computing: A systematic review on issues, challenges and solutions
R Rezapour, P Asghari, HHS Javadi… - Computer Science Review, 2021 - Elsevier
Fog computing refers to cloud computing development to the edge of a corporate network.
Fog computing, as a promising computing paradigm, facilitates computing, storing and …
Fog computing, as a promising computing paradigm, facilitates computing, storing and …
Energy-efficient and secure mobile fog-based cloud for the Internet of Things
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is
highly suitable for obtaining virtualized data without additional waiting time. However, the …
highly suitable for obtaining virtualized data without additional waiting time. However, the …
Authenticated key agreement for IoT network using HECC and CRT four co-primes
Abstract Internet of Things (IoT) is an integral part of our daily lives and the security of these
devices is paramount. However, IoT devices are often resource constrained, requiring …
devices is paramount. However, IoT devices are often resource constrained, requiring …
A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network
N Solari Esfehani, H Haj Seyyed Javadi - Wireless Networks, 2021 - Springer
Currently, IoT is being used as a novel tool in many applications. Some applications use the
end nodes such as wireless sensor network, RFID and embedded systems referred to as …
end nodes such as wireless sensor network, RFID and embedded systems referred to as …
Scaling networks and capturing keys using combined combinatorial block designs
A Frolov, N Kochetova, A Klyagin - Computer Science On-line Conference, 2023 - Springer
This paper discusses a united approach to detecting blocks containing an uncompromised
key in wireless sensor networks that have a structure of combinatorial block designs and …
key in wireless sensor networks that have a structure of combinatorial block designs and …
Replication‐aware secure resource administration scheme for Internet of Things‐smart city applications
E Al Solami - Transactions on Emerging Telecommunications …, 2021 - Wiley Online Library
The distributed and heterogeneous nature of the Internet of Things (IoT) paradigm provides
backhauled support for different smart‐city applications. As it provides ubiquitous access to …
backhauled support for different smart‐city applications. As it provides ubiquitous access to …
CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain
Blockchain networks are consistently challenged with security and accessibility issues, and
technological developments call for the need for their security and integrity more than ever …
technological developments call for the need for their security and integrity more than ever …
[PDF][PDF] A review on information security in cloud based system during covid-19 pandemic
P Chatterjee, S Mukherjee, R Bose… - Brainwave, Brainware …, 2021 - bwuexam.org
Work from Home is the new trend in corporate working culture in this Covid-19 pandemic
situation. Of course it is a preventative measure to avoid the infection from the disease. Not …
situation. Of course it is a preventative measure to avoid the infection from the disease. Not …
Scaling networks and capturing keys using combined systems of sets
A Frolov, N Kochetova - Society 5.0: Cyber-Solutions for Human-Centric …, 2023 - Springer
This chapter discusses a united approach to detecting blocks containing an uncompromised
key in wireless sensor networks with a structure of combinatorial designs and scaling those …
key in wireless sensor networks with a structure of combinatorial designs and scaling those …
Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies.
S Khajouei-Nejad, S Jabbehdari… - ISeCure, 2025 - search.ebscohost.com
Protecting sensitive data is crucial in various fields, including Information Technologies,
Network Security, and healthcare records. Implementing precise access policies for …
Network Security, and healthcare records. Implementing precise access policies for …