Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …
2018 across the European Union, new legal requirements for the protection of personal data …
Blockchain-based publicly verifiable data deletion scheme for cloud storage
With the rapid development of cloud storage, more and more data owners store their data on
the remote cloud, that can reduce data owners' overhead because the cloud server …
the remote cloud, that can reduce data owners' overhead because the cloud server …
[HTML][HTML] Security and privacy issues of physical objects in the IoT: Challenges and opportunities
Abstract In the Internet of Things (IoT), security and privacy issues of physical objects are
crucial to the related applications. In order to clarify the complicated security and privacy …
crucial to the related applications. In order to clarify the complicated security and privacy …
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry
As one of the most significant issues in the financial industry, customers' privacy information
protection has been considered a challenging research over years. The constant …
protection has been considered a challenging research over years. The constant …
Provable data transfer from provable data possession and deletion in cloud storage
With the rapid development of cloud storage, an increasing number of users prefer to store
their data on the remote cloud to reduce the burden of maintaining the data by themselves …
their data on the remote cloud to reduce the burden of maintaining the data by themselves …
Trust evaluation model of cloud user based on behavior data
Z Chen, L Tian, C Lin - International Journal of Distributed …, 2018 - journals.sagepub.com
In the process of using the cloud platform, how to ensure the safety of users is a matter we
must concern. The user authentication can provide a certain degree of security, but when the …
must concern. The user authentication can provide a certain degree of security, but when the …
CP‐ABE‐Based Secure and Verifiable Data Deletion in Cloud
J Ma, M Wang, J **ong, Y Hu - Security and Communication …, 2021 - Wiley Online Library
Cloud data, the ownership of which is separated from their administration, usually contain
users' private information, especially in the fifth‐generation mobile communication (5G) …
users' private information, especially in the fifth‐generation mobile communication (5G) …
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
With the widespread adoption of mobile devices in various IoT services, an increasing
amount of personal sensitive data are stored in IoT devices using flash memory as storage …
amount of personal sensitive data are stored in IoT devices using flash memory as storage …
Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT
The emerging cloud-based Internet of Things (IoT) paradigm enables IoT devices to directly
upload their collected data to the remote cloud and allows data owners (DOs) to …
upload their collected data to the remote cloud and allows data owners (DOs) to …