Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
The security of big data in fog-enabled IoT applications including blockchain: A survey
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
A survey on IoT security: application areas, security threats, and solution architectures
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …
can be empowered to create, receive, and exchange data in a seamless manner. Various …
Blockchain based searchable encryption for electronic health record sharing
Data leakage in electronic health records (EHRs) could result in the compromise of patient
privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …
privacy (eg medical conditions). Generally most data in EHRs remain unchanged once they …
All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption
The goal of searchable encryption (SE) is to enable a client to execute searches over
encrypted files stored on an untrusted server while ensuring some measure of privacy for …
encrypted files stored on an untrusted server while ensuring some measure of privacy for …
Leakage-abuse attacks against searchable encryption
Schemes for secure outsourcing of client data with search capability are being increasingly
marketed and deployed. In the literature, schemes for accomplishing this efficiently are …
marketed and deployed. In the literature, schemes for accomplishing this efficiently are …
New constructions for forward and backward private symmetric searchable encryption
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …
crucial to minimize the information revealed to the server as a result of update operations …
Path ORAM: an extremely simple oblivious RAM protocol
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme …
Oblix: An efficient oblivious search index
Search indices are fundamental building blocks of many systems, and there is great interest
in running them on encrypted data. Unfortunately, many known schemes that enable search …
in running them on encrypted data. Unfortunately, many known schemes that enable search …
Searchable symmetric encryption with forward search privacy
Searchable symmetric encryption (SSE) has been widely applied in the encrypted database
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …
for queries in practice. Although SSE is powerful and feature-rich, it is always plagued by …