Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT
5G network is considered as a key enabler in meeting continuously increasing demands for
the future Internet of Things (IoT) services, including high data rate, numerous devices …
the future Internet of Things (IoT) services, including high data rate, numerous devices …
Security and privacy for healthcare blockchains
R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2021 - ieeexplore.ieee.org
Healthcare blockchains provide an innovative way to store healthcare information, execute
healthcare transactions, and build trust for healthcare data sharing and data integration in a …
healthcare transactions, and build trust for healthcare data sharing and data integration in a …
Robust and universal seamless handover authentication in 5G HetNets
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous
and backward-compatible networks. With the increased heterogeneity and densification of …
and backward-compatible networks. With the increased heterogeneity and densification of …
[PDF][PDF] OCTOPUS: An edge-fog mutual authentication scheme.
MH Ibrahim - Int. J. Netw. Secur., 2016 - academia.edu
Authentication is an important and challenging issue for the security of Fog computing since,
services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or …
services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or …
Secure and efficient handover authentication based on bilinear pairing functions
Seamless handover over multiple access points is highly desirable to mobile nodes, but
ensuring security and efficiency of this process is challenging. This paper shows that prior …
ensuring security and efficiency of this process is challenging. This paper shows that prior …
A distributed authentication scheme based on smart contract for roaming service in mobile vehicular networks
Secure and real-time communication is an essential condition in mobile vehicular networks,
and this requires secure authentication and seamless access enabled by roaming services …
and this requires secure authentication and seamless access enabled by roaming services …
FogHA: An efficient handover authentication for mobile devices in fog computing
Y Guo, Y Guo - Computers & Security, 2021 - Elsevier
Fog computing is a new distributed computing paradigm that extends cloud services to the
edge of the network, with features such as mobile support, location awareness, and low …
edge of the network, with features such as mobile support, location awareness, and low …
AnFRA: Anonymous and fast roaming authentication for space information network
Nowadays, the Space Information Network (SIN) has been widely used in real life because
of its advantages of communicating anywhere at any time. This feature is leading to a new …
of its advantages of communicating anywhere at any time. This feature is leading to a new …
Is 5G handover secure and private? A survey
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …