Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Analysis of cryptocurrency transactions from a network perspective: An overview
As one of the most important and famous applications of blockchain technology,
cryptocurrency has attracted extensive attention recently. Empowered by blockchain …
cryptocurrency has attracted extensive attention recently. Empowered by blockchain …
[KNYGA][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
A credential system is a system in which users can obtain credentials from organizations
and demonstrate possession of these credentials. Such a system is anonymous when …
and demonstrate possession of these credentials. Such a system is anonymous when …
The ring of gyges: Investigating the future of criminal smart contracts
Thanks to their anonymity (pseudonymity) and elimination of trusted intermediaries,
cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and …
cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and …
Publicly verifiable secret sharing
M Stadler - International Conference on the Theory and …, 1996 - Springer
A secret sharing scheme allows to share a secret among sev-eral participants such that only
certain groups of them can recover it. Verifiable secret sharing has been proposed to …
certain groups of them can recover it. Verifiable secret sharing has been proposed to …
Compact e-cash
This paper presents efficient off-line anonymous e-cash schemes where a user can
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …
Cryptovirology: Extortion-based security threats and countermeasures
A Young, M Yung - … 1996 IEEE Symposium on Security and …, 1996 - ieeexplore.ieee.org
Traditionally, cryptography and its applications are defensive in nature, and provide privacy,
authentication, and security to users. In this paper we present the idea of Cryptovirology …
authentication, and security to users. In this paper we present the idea of Cryptovirology …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
An immunological approach to change detection: Algorithms, analysis and implications
We present new results on a distributable change-detection method inspired by the natural
immune system. A weakness in the original algorithm was the exponential cost of generating …
immune system. A weakness in the original algorithm was the exponential cost of generating …
Digital payment systems with passive anonymity-revoking trustees
Anonymity of the participants is an important requirement for some applications in electronic
commerce, in particular for payment systems. Because anonymity could be in conflict with …
commerce, in particular for payment systems. Because anonymity could be in conflict with …