Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
IoT elements, layered architectures and security issues: A comprehensive survey
The use of the Internet is growing in this day and age, so another area has developed to use
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …
the Internet, called Internet of Things (IoT). It facilitates the machines and objects to …
[HTML][HTML] Authentication and identity management of IoHT devices: achievements, challenges, and future directions
Abstract The Internet of Things (IoT) paradigm serves as an enabler technology in several
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …
Cyber and physical security vulnerability assessment for IoT-based smart homes
B Ali, AI Awad - sensors, 2018 - mdpi.com
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices,
objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated …
objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated …
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art
R Sharma, R Arya - Transactions on Emerging …, 2023 - Wiley Online Library
Abstract The Internet of Things (IoT) is a network of physical objects or “things” implanted
with electronics, software, sensors, and connectivity to allow them to exchange data with …
with electronics, software, sensors, and connectivity to allow them to exchange data with …
Threats and corrective measures for IoT security with observance of cybercrime: A survey
Internet of Things (IoT) is the utmost assuring framework to facilitate human life with quality
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
and comfort. IoT has contributed significantly to numerous application areas. The stormy …
A novel scheme for designing secure substitution boxes (S-boxes) based on Mobius group and finite field
B Arshad, N Siddiqui, Z Hussain… - Wireless Personal …, 2022 - Springer
Data encryption with substitution-box (S-box) is now widely regarded as the most secure
method of communicating in order to prevent unauthorized access to sensitive and …
method of communicating in order to prevent unauthorized access to sensitive and …
A distributed security mechanism for resource-constrained IoT devices
J King, AI Awad - Informatica, 2016 - informatica.si
Abstract Internet of Things (IoT) devices have grown up to comprise embedded systems and
sensors with the ability to connect, collect, and transmit data over the Internet. Although …
sensors with the ability to connect, collect, and transmit data over the Internet. Although …
[PDF][PDF] Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers.
In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are
used with the purpose of inducing confusion in cryptosystems. For the last decade, most of …
used with the purpose of inducing confusion in cryptosystems. For the last decade, most of …
A hybrid secured approach combining LSB steganography and AES using mosaic images for ensuring data security
S Roy, MM Islam - SN Computer Science, 2022 - Springer
Steganography is a technique of hiding information in digital media such as images, text,
audio, etc. This digital media is used as the cover to make the private message invisible …
audio, etc. This digital media is used as the cover to make the private message invisible …
[HTML][HTML] Throughput optimized reversible cellular automata based security algorithm
Reversible cellular automation is a highly parallel system and produces enhanced
throughput in its cryptographic applications. The throughput optimized security algorithm …
throughput in its cryptographic applications. The throughput optimized security algorithm …