Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Enhancing privacy and availability for data clustering in intelligent electrical service of IoT
The ever-growing demand for electrical energy of sensing devices in the Internet of Things
(IoT) has led to generating large amounts of electricity consumption data. Electricity service …
(IoT) has led to generating large amounts of electricity consumption data. Electricity service …
A secure authorized deduplication scheme for cloud data based on blockchain
Deduplication scheme based on convergent encryption (CE) is widely-used in cloud storage
system to eliminate redundant data. However, the adversaries can obtain the data by the …
system to eliminate redundant data. However, the adversaries can obtain the data by the …
Lightweight multifactor authentication scheme for nextgen cellular networks
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …
small-cell communication will result in effective device-to-device (D2D) communication. High …
Secure heterogeneous data deduplication via fog-assisted mobile crowdsensing in 5G-enabled IIoT
Mobile crowdsensing provides the data collection and sharing for the 5G-enabled industrial
Internet of Things. However, the redundant and duplicated heterogeneous sensing data …
Internet of Things. However, the redundant and duplicated heterogeneous sensing data …
(a, k)-Anonymous scheme for privacy-preserving data collection in IoT-based healthcare services systems
H Li, F Guo, W Zhang, J Wang, J **ng - Journal of Medical Systems, 2018 - Springer
The widely use of IoT technologies in healthcare services has pushed forward medical
intelligence level of services. However, it also brings potential privacy threat to the data …
intelligence level of services. However, it also brings potential privacy threat to the data …
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
With the widespread adoption of mobile devices in various IoT services, an increasing
amount of personal sensitive data are stored in IoT devices using flash memory as storage …
amount of personal sensitive data are stored in IoT devices using flash memory as storage …
Privacy-preserving edge-assisted image retrieval and classification in IoT
Abstract Internet of Things (IoT) has drawn much attention in recent years. However, the
image data captured by IoT terminal devices are closely related to users' personal …
image data captured by IoT terminal devices are closely related to users' personal …
Achieving incentive, security, and scalable privacy protection in mobile crowdsensing services
Mobile crowdsensing as a novel service schema of the Internet of Things (IoT) provides an
innovative way to implement ubiquitous social sensing. How to establish an effective …
innovative way to implement ubiquitous social sensing. How to establish an effective …
Secure encrypted data with authorized deduplication in cloud
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based
on convergent encryption and the role re-encryption algorithm to prevent the privacy data …
on convergent encryption and the role re-encryption algorithm to prevent the privacy data …
Survey on techniques for authorized deduplication of encrypted data in cloud
MB Waghmare, SV Padwekar - 2020 International Conference …, 2020 - ieeexplore.ieee.org
Cloud computing technology is on-demand nowadays. Number of files created, stored and
processed in cloud is increasing per day. The amount of space, processing power …
processed in cloud is increasing per day. The amount of space, processing power …