Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain-based authentication for IIoT devices with PUF
With the continuous development of edge computing and IIoT technology, there are growing
types of IIoT devices, and the number of such devices is continuously climbing. It is …
types of IIoT devices, and the number of such devices is continuously climbing. It is …
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grou**-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment
Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the
Internet of Things (IoT) network due to its autonomous data collection as well as transfer …
Internet of Things (IoT) network due to its autonomous data collection as well as transfer …
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grou** proofs
Since the introduction of the concept of grou** proofs by Juels, which permit RFID tags to
generate evidence that they have been scanned simultaneously, various new schemes …
generate evidence that they have been scanned simultaneously, various new schemes …
[PDF][PDF] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography.
Y Liu, X Qin, C Wang, B Li - J. Comput., 2013 - jcomputers.us
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency
Identification (RFID) system development further. In this paper, we propose a robust …
Identification (RFID) system development further. In this paper, we propose a robust …
ECC-based grou**-proof RFID for inpatient medication safety
Q Lin, F Zhang - Journal of Medical Systems, 2012 - Springer
Several papers were proposed in which symmetric cryptography was used to design RFID
grou**-proof for medication safety in the Journal of Medical Systems. However, if we want …
grou**-proof for medication safety in the Journal of Medical Systems. However, if we want …
Adding features of educational games for teaching Physics
Virtual laboratories (VLs) have to overcome important challenges to improve student
knowledge, understanding and motivation. This research aims to test the hypothesis that …
knowledge, understanding and motivation. This research aims to test the hypothesis that …
Modifying the ECC-based grou**-proof RFID system to increase inpatient medication safety
WT Ko, SY Chiou, EH Lu, HKC Chang - Journal of medical systems, 2014 - Springer
RFID technology is increasingly used in applications that require tracking, identification, and
authentication. It attaches RFID-readable tags to objects for identification and execution of …
authentication. It attaches RFID-readable tags to objects for identification and execution of …
Cryptanalysis and improvement of a group RFID authentication protocol
In recent years, radio frequency identification (RFID) systems have become popular for
identification. The key technology to protect the security of RFID systems is mutual …
identification. The key technology to protect the security of RFID systems is mutual …
The Lightweight RFID Grou**‐Proof Protocols with Identity Authentication and Forward Security
Z Shi, X Zhang, J Liu - Wireless Communications and Mobile …, 2020 - Wiley Online Library
In many fields, multiple RFID tags are often combined into a group to identify an object. An
RFID grou**‐proof protocol is utilized to prove the simultaneous existence of a group of …
RFID grou**‐proof protocol is utilized to prove the simultaneous existence of a group of …
A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function
The applications of using multi-tag RFID technology have rapidly grown to be used in
different fields of life. However, security and privacy are the main issues with this technology …
different fields of life. However, security and privacy are the main issues with this technology …