Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application
PM Kumar, UD Gandhi - The Journal of Supercomputing, 2020 - Springer
As health data are very sensitive, there is a need to prevent and control the health data with
end-to-end security solutions. In general, a number of authentication and authorization …
end-to-end security solutions. In general, a number of authentication and authorization …
Practical and tightly-secure digital signatures and authenticated key exchange
Tight security is increasingly gaining importance in real-world cryptography, as it allows to
choose cryptographic parameters in a way that is supported by a security proof, without the …
choose cryptographic parameters in a way that is supported by a security proof, without the …
Signed (group) diffie–hellman key exchange with tight security
We propose the first tight security proof for the ordinary two-message signed Diffie–Hellman
key exchange protocol in the random oracle model. Our proof is based on the strong …
key exchange protocol in the random oracle model. Our proof is based on the strong …
Post quantum noise
We introduce PQNoise, a post-quantum variant of the Noise framework. We demonstrate
that it is possible to replace the Diffie-Hellman key-exchanges in Noise with KEMs in a …
that it is possible to replace the Diffie-Hellman key-exchanges in Noise with KEMs in a …
Dynamic Group Time-Based One-Time Passwords
Group time-based one-time passwords (GTOTP) is a novel lightweight cryptographic
primitive for achieving anonymous client authentication, which enables the efficient …
primitive for achieving anonymous client authentication, which enables the efficient …
Flexible authenticated and confidential channel establishment (fACCE): Analyzing the noise protocol framework
The Noise protocol framework is a suite of channel establishment protocols, of which each
individual protocol ensures various security properties of the transmitted messages, but …
individual protocol ensures various security properties of the transmitted messages, but …
Key-schedule security for the TLS 1.3 standard
Abstract Transport Layer Security (TLS) is the cryptographic backbone of secure
communication on the Internet. In its latest version 1.3, the standardization process has …
communication on the Internet. In its latest version 1.3, the standardization process has …
HTTPS contribution in web application security: A systematic literature review
F Wijitrisnanto, P Yustianto - 2020 International Conference …, 2020 - ieeexplore.ieee.org
A Web application is one of the most used technology nowadays due to its flexibility in
delivering services to society. It also plays a good portion in enhancing our daily life since it …
delivering services to society. It also plays a good portion in enhancing our daily life since it …
T0RTT: non-interactive immediate forward-secret single-pass circuit construction
Maintaining privacy on the Internet with the presence of powerful adversaries such as nation-
state attackers is a challenging topic, and the Tor project is currently the most important tool …
state attackers is a challenging topic, and the Tor project is currently the most important tool …
Key Exchange
C BOYD - Asymmetric Cryptography: Primitives and Protocols, 2022 - Wiley Online Library
This chapter explains the elements of key exchange, specifically the steps in a key
exchange protocol, the parties that are involved and the messages which may be sent. It …
exchange protocol, the parties that are involved and the messages which may be sent. It …