Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Industrial internet of things ecosystems security and digital forensics: achievements, open challenges, and future directions
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …
revolution, which is projected to continue accelerating and realizing digital transformations …
[HTML][HTML] An overview of privacy dimensions on the industrial Internet of Things (IIoT)
The rapid advancements in technology have given rise to groundbreaking solutions and
practical applications in the field of the Industrial Internet of Things (IIoT). These …
practical applications in the field of the Industrial Internet of Things (IIoT). These …
A blockchain-based shamir's threshold cryptography scheme for data protection in industrial internet of things settings
K Yu, L Tan, C Yang, KKR Choo… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application,
integrates the global industrial system with other advanced computing, analysis, and …
integrates the global industrial system with other advanced computing, analysis, and …
A personalized privacy protection framework for mobile crowdsensing in IIoT
With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent
data collection and processing paradigm of the industrial Internet of Things, has provided a …
data collection and processing paradigm of the industrial Internet of Things, has provided a …
Privacy-preserving attribute-based keyword search in shared multi-owner setting
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Multi-authority attribute-based keyword search over encrypted cloud data
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
Achieving privacy-preserving DSSE for intelligent IoT healthcare system
Y Liu, J Yu, J Fan, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As the product of combining Internet of Things (IoT), cloud computing, and traditional
healthcare, Intelligent IoT Healthcare (IIoTH) brings us a lot of convenience, meanwhile …
healthcare, Intelligent IoT Healthcare (IIoTH) brings us a lot of convenience, meanwhile …
Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices
Y Lu, J Li - IEEE Transactions on Mobile Computing, 2021 - ieeexplore.ieee.org
Cloud storage services have grown extensively in recent years. For security and privacy
purposes, sensitive data need to be outsourced to clouds in encrypted form. Searchable …
purposes, sensitive data need to be outsourced to clouds in encrypted form. Searchable …
Lightweight searchable encryption protocol for industrial internet of things
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …