Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
[HTML][HTML] A survey of internet of things (IoT) authentication schemes
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …
identification and another way for communication with each other. The spectrum of IoT …
A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
How can heterogeneous internet of things build our future: A survey
Heterogeneous Internet of Things (HetIoT) is an emerging research field that has strong
potential to transform both our understanding of fundamental computer science principles …
potential to transform both our understanding of fundamental computer science principles …
Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
Security, privacy and trust in Internet of Things: The road ahead
Abstract Internet of Things (IoT) is characterized by heterogeneous technologies, which
concur to the provisioning of innovative services in various application domains. In this …
concur to the provisioning of innovative services in various application domains. In this …
TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …