Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …
supports demanded services. The architecture of cloud computing consists of different kinds …
Private machine learning classification based on fully homomorphic encryption
Machine learning classification is an useful tool for trend prediction by analyzing big data. As
supporting homomorphic operations over encrypted data without decryption, fully …
supporting homomorphic operations over encrypted data without decryption, fully …
Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in
the context of the industry as digitization becomes a business priority for various …
the context of the industry as digitization becomes a business priority for various …
Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario
M Ma, G Shi, F Li - IEEE access, 2019 - ieeexplore.ieee.org
The rapid development of the Internet of Things (IoT) and the explosive growth of valuable
data produced by user equipment have led to strong demand for access control, especially …
data produced by user equipment have led to strong demand for access control, especially …
[HTML][HTML] An attribute-based collaborative access control scheme using blockchain for IoT devices
Y Zhang, B Li, B Liu, J Wu, Y Wang, X Yang - Electronics, 2020 - mdpi.com
The Internet of Things (IoT) benefits our lives by integrating physical devices to the real
world and offers a crucial internet infrastructure for future civilization. Because IoT devices …
world and offers a crucial internet infrastructure for future civilization. Because IoT devices …
An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA
In this paper, we propose an enhanced security framework for securing the cloud users data
in the cloud environment. This new security framework consists of access control …
in the cloud environment. This new security framework consists of access control …
A secure cloud-assisted urban data sharing framework for ubiquitous-cities
With the accelerated process of urbanization, more and more people tend to live in cities. In
order to deal with the big data that are generated by citizens and public city departments …
order to deal with the big data that are generated by citizens and public city departments …
Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …
role in future Industrial Internet-of-Things communication, where smart devices will be …
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things
With the rapid technological advancements in the Internet of Things (IoT), wireless
communication and cloud computing, smart health is expected to enable comprehensive …
communication and cloud computing, smart health is expected to enable comprehensive …