Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
“a stalker's paradise” how intimate partner abusers exploit technology
This paper describes a qualitative study with 89 participants that details how abusers in
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …
intimate partner violence (IPV) contexts exploit technologies to intimidate, threaten, monitor …
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
The main objective of this study is to propose a novel verification secure framework for
patient authentication between an access point (patient enrolment device) and a node …
patient authentication between an access point (patient enrolment device) and a node …
A lightweight secure data sharing scheme for mobile cloud computing
R Li, C Shen, H He, X Gu, Z Xu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the popularity of cloud computing, mobile devices can store/retrieve personal data from
anywhere at any time. Consequently, the data security problem in mobile cloud becomes …
anywhere at any time. Consequently, the data security problem in mobile cloud becomes …
Secure halftone image steganography based on pixel density transition
Most state-of-the-art halftone image steganographic techniques only consider the flip**
distortion according to the human visual system, which are not always secure when they are …
distortion according to the human visual system, which are not always secure when they are …
Deftl: Implementing plausibly deniable encryption in flash translation layer
S Jia, L ** biometric data secure is a general
problem. Many studies have presented various ways of protecting biometric data especially …
problem. Many studies have presented various ways of protecting biometric data especially …
An application-layer plausibly deniable encryption system for wearable devices
Wearable devices especially smartwatches are widely used in our daily life. With their
increased use, a large amount of sensitive data are collected, stored, and managed in those …
increased use, a large amount of sensitive data are collected, stored, and managed in those …
Digital privacy perceptions of asylum seekers in Germany: An empirical study about smartphone usage during the flight
E Steinbrink, L Reichert, M Mende… - Proceedings of the ACM on …, 2021 - dl.acm.org
Since 2015, an increased number of asylum seekers is coming to Europe. These migration
movements increasingly rely on digital infrastructure, such as mobile internet access and …
movements increasingly rely on digital infrastructure, such as mobile internet access and …
A fine-grained and lightweight data access control model for mobile cloud computing
S Fugkeaw - IEEE Access, 2020 - ieeexplore.ieee.org
With rapidly increasing adoption of cloud computing and the advancement of today mobile
computing, it is inevitable that mobile devices are used to receive and send the data through …
computing, it is inevitable that mobile devices are used to receive and send the data through …
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
We introduce MobiCeal, the first practical Plausibly Deniable Encryption (PDE) system for
mobile devices that can defend against strong coercive multi-snapshot adversaries, who …
mobile devices that can defend against strong coercive multi-snapshot adversaries, who …