Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
MedShare: A privacy-preserving medical data sharing system by using blockchain
Electronic Health Record (EHR) and its privacy have attracted widespread attention with the
development of the healthcare industry in recent years. As locking medical data in a single …
development of the healthcare industry in recent years. As locking medical data in a single …
Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system
Due to the massive applications of Internet of Things (IoT) and the prevalence of wearable
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …
Key escrow-free attribute based encryption with user revocation
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …
The key generator center issues all users' secret keys and can decrypt each ciphertext by …
Privacy-preserving attribute-based keyword search in shared multi-owner setting
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
supports fine-grained access control over encrypted data in the cloud. However, prior CP …
Attribute-based searchable encryption: a survey
L Yan, G Wang, T Yin, P Liu, H Feng, W Zhang, H Hu… - Electronics, 2024 - mdpi.com
With the advent of the big data era, the size and complexity of data continue to increase,
which makes the requirement for data privacy and security increasingly urgent. However …
which makes the requirement for data privacy and security increasingly urgent. However …
Multi-authority attribute-based keyword search over encrypted cloud data
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
Lightweight searchable encryption protocol for industrial internet of things
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …
Practical attribute-based multi-keyword search scheme in mobile crowdsourcing
Cloud-based mobile crowd-sourcing has been an attractive solution to provide data storage
and share services for resource-limited mobile devices in a privacy-preserving manner, but …
and share services for resource-limited mobile devices in a privacy-preserving manner, but …
Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage
In this paper, we introduce a concept of transparent integrity auditing and propose a
concrete scheme based on the blockchain, which goes one step beyond existing public …
concrete scheme based on the blockchain, which goes one step beyond existing public …
Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving
data confidentiality securely. Many SE solutions have been designed to improve efficiency …
data confidentiality securely. Many SE solutions have been designed to improve efficiency …