Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A secure and authenticated mobile payment protocol against off-site attack strategy
Mobile payment system has been expected to provide more efficient and convenient
payment methods. However, compared to traditional payments, mobile payment issues …
payment methods. However, compared to traditional payments, mobile payment issues …
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism
PC Huang, CC Chang, YH Li, Y Liu - Journal of Information Security and …, 2021 - Elsevier
In recent years, QR code is popular online and offline, and it is an ideal media for secret
sharing. This paper utilizes the error correction capacity of QR code to propose an (n, n) …
sharing. This paper utilizes the error correction capacity of QR code to propose an (n, n) …
XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes
L Tan, Y Lu, X Yan, L Liu, X Zhou - Multimedia Tools and Applications, 2020 - Springer
Quick response (QR) codes are becoming increasingly popular in various areas of life due
to the advantages of the error correction capacity, the ability to be scanned quickly and the …
to the advantages of the error correction capacity, the ability to be scanned quickly and the …
Efficient (k, n)-threshold secret sharing method with cheater prevention for QR code application
PC Huang, CC Chang, YH Li - Journal of Internet Technology, 2022 - jit.ndhu.edu.tw
To protect secret message, secret sharing technique divides it into n shares and distributes
them to n involved participants. However, it is hardly to prevent a dishonest participant to …
them to n involved participants. However, it is hardly to prevent a dishonest participant to …
Secured Secret sharing of QR codes based on nonnegative matrix factorization and regularized super resolution convolutional neural network
Advances in information technology have harnessed the application of Quick Response
(QR) codes in day-to-day activities, simplifying information exchange. QR codes are …
(QR) codes in day-to-day activities, simplifying information exchange. QR codes are …
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning
Abstract Machine learning is becoming increasingly popular in modern technology and has
been adopted in various application areas. However, researchers have demonstrated that …
been adopted in various application areas. However, researchers have demonstrated that …
Secured transmission design schemes based on chaotic synchronization and optimal high gain observers
I Daldoul, AS Tlili - Simulation Modelling Practice and Theory, 2022 - Elsevier
The distinguishing feature of the proposed secured transmission design scheme is the use
of chaotic nonlinear systems and optimal high gain observers for the encryption/decryption …
of chaotic nonlinear systems and optimal high gain observers for the encryption/decryption …
Comparing sustainability claims with assurance in organic agriculture standards
Voluntary organic standard-setting organisations (SSOs) depend upon public trust in the
truth claims implied by their labels: that the product in question has been produced using …
truth claims implied by their labels: that the product in question has been produced using …
Research on the risk of block chain technology in Internet finance supported by wireless network
Y Chen, Y Zhang, B Zhou - EURASIP Journal on Wireless …, 2020 - Springer
In this paper, a cascaded depth learning framework is constructed. A cascaded depth model
is successfully implemented by studying and analyzing the specific feature transformation …
is successfully implemented by studying and analyzing the specific feature transformation …
Privacy preservation authentication: group secret handshake with multiple groups
The technique of group secret handshake (GSH) has been used to help the members
affiliated with the same group in achieving private authentication. After executing GSH …
affiliated with the same group in achieving private authentication. After executing GSH …