Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Social-aware stateless routingin pocket switched networks
Existing social-aware routing protocols for pocket switched networks make use of the
information about the social structure of the network deduced by state information of nodes …
information about the social structure of the network deduced by state information of nodes …
{Ad-Hoc} secure {Two-Party} computation on mobile devices using hardware tokens
Secure two-party computation allows two mutually distrusting parties to jointly compute an
arbitrary function on their private inputs without revealing anything but the result. An …
arbitrary function on their private inputs without revealing anything but the result. An …
PSaD: A privacy-preserving social-assisted content dissemination scheme in DTNs
Content dissemination is very useful for many mobile applications, like instant messaging,
file sharing, and advertisement broadcast, etc. In real life, for various kinds of time …
file sharing, and advertisement broadcast, etc. In real life, for various kinds of time …
Understanding soft skills requirements for mobile applications developers
J Jia, Z Chen, X Du - … Science and Engineering (CSE) and IEEE …, 2017 - ieeexplore.ieee.org
The development of smart phone software industry has brought high demands for mobile
developers. The skills of developers have a great influence on the quality of software …
developers. The skills of developers have a great influence on the quality of software …
Investigating the privacy versus forwarding accuracy tradeoff in opportunisticinterest-casting
Many mobile social networking applications are based on a “friend proximity detection” step,
according to which two mobile users try to jointly estimate whether they have friends in …
according to which two mobile users try to jointly estimate whether they have friends in …
Privacy preserving distributed attribute computation for usage control in the internet of things
The distributiveness of Internet of Things (IoT) applications, introduces the requirement of a
decentralized control system able to enforce security, safety and management policies …
decentralized control system able to enforce security, safety and management policies …
Losero: A locality sensitive routing protocol in opportunistic networks with contact profiles
Mobility trajectories of users contain personal information that when analyzed may reveal
relevant data usable as message-sharing condition, eg, interests in common or similar …
relevant data usable as message-sharing condition, eg, interests in common or similar …
Overview on privacy-preserving profile-matching mechanisms in mobile social networks in proximity (MSNP)
Y Wang, J Xu - 2014 Ninth Asia Joint Conference on …, 2014 - ieeexplore.ieee.org
Recently, mobile social networking in proximity (MSNP) has gained tremendous attentions,
which refers to the social interactions among physically proximate mobile users directly …
which refers to the social interactions among physically proximate mobile users directly …
Application of Secure Two-Party Computation in a Privacy-Preserving Android App
Data privacy has become increasingly important in recent years, with the rise of cyber
threats and the unauthorized sharing of sensitive information. Our work within the E-Corridor …
threats and the unauthorized sharing of sensitive information. Our work within the E-Corridor …
Privacy preserving distributed computation of private attributes for collaborative privacy aware usage control systems
Collaborative smart services provide functionalities which exploit data collected from
different sources to provide benefits to a community of users. Such data, however, might be …
different sources to provide benefits to a community of users. Such data, however, might be …