Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Threshold signatures with private accountability
Existing threshold signature schemes come in two flavors:(i) fully private, where the
signature reveals nothing about the set of signers that generated the signature, and (ii) …
signature reveals nothing about the set of signers that generated the signature, and (ii) …
Secure multi-party computation-based privacy-preserving authentication for smart cities
The increasing concern for identity confidentiality in the Smart City scenario has fostered
research on privacy-preserving authentication based on pseudonymization. Pseudonym …
research on privacy-preserving authentication based on pseudonymization. Pseudonym …
Trust model for secure group leader-based communications in VANET
VANET aims to improve safety for all road users. Vehicles exchange safety messages over
wireless communication links which are prone to multiple attacks. To enhance the existing …
wireless communication links which are prone to multiple attacks. To enhance the existing …
A2RID—Anonymous Direct Authentication and Remote Identification of Commercial Drones
The recent worldwide introduction of RemoteID (RID) regulations forces all unmanned
aircrafts (UAs), also known as drones, to broadcast in plaintext on the wireless channel their …
aircrafts (UAs), also known as drones, to broadcast in plaintext on the wireless channel their …
SPPEAR: security & privacy-preserving architecture for participatory-sensing applications
Recent advances in sensing, computing, and networking have paved the way for the
emerging paradigm of participatory sensing (PS). The openness of such systems and the …
emerging paradigm of participatory sensing (PS). The openness of such systems and the …
A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing
Crowdsensing requires scalable privacy-preserving authentication that allows users to send
anonymously sensing reports, while enabling eventual anonymity revocation in case of user …
anonymously sensing reports, while enabling eventual anonymity revocation in case of user …
Fast revocation of attribute-based credentials for both users and verifiers
Attribute-based credentials allow a user to prove properties about herself anonymously.
Revoking such credentials, which requires singling them out, is hard because it is at odds …
Revoking such credentials, which requires singling them out, is hard because it is at odds …
Secure and privacy-preserving smartphone-based traffic information systems
Increasing smartphone penetration, combined with the wide coverage of cellular
infrastructures, renders smartphone-based traffic information systems (TISs) an attractive …
infrastructures, renders smartphone-based traffic information systems (TISs) an attractive …
A survey of quantum secure group signature schemes: Lattice-based approach
The group signatures allow any member to sign the message on behalf of the group. While
anyone who does not need to be a group member can verify the signature, they do not know …
anyone who does not need to be a group member can verify the signature, they do not know …
Certificate revocation schemes in vehicular networks: A survey
Q Wang, D Gao, D Chen - IEEE Access, 2020 - ieeexplore.ieee.org
The problem of security in vehicular networks is a vital issue and attracts researchers'
increasing attention for its unique characteristics, such as the vulnerability of wireless media …
increasing attention for its unique characteristics, such as the vulnerability of wireless media …