Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city
We propose a hierarchical blockchain-based platform for ensuring the integrity of smart city
Internet-of-Things (IoT) data and blockchain interoperability in this paper. The well-defined …
Internet-of-Things (IoT) data and blockchain interoperability in this paper. The well-defined …
Data security and privacy-preserving in edge computing paradigm: Survey and open issues
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …
edge of the network, the traditional centralized cloud computing model has come to a …
Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks
Mobile edge computing (MEC) is a promising paradigm to provide cloud-computing
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
capabilities in close proximity to mobile devices in fifth-generation (5G) networks. In this …
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
Novel visual and statistical image features for microblogs news verification
Microblog has been a popular media platform for reporting and propagating news. However,
fake news spreading on microblogs would severely jeopardize its public credibility. To …
fake news spreading on microblogs would severely jeopardize its public credibility. To …
Security in Internet of Things: issues, challenges, taxonomy, and architecture
V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …
Internet, those with a digital identity, is increasing day by day. With the developments in the …
Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement
Keyword-based search over encrypted outsourced data has become an important tool in the
current cloud computing scenario. The majority of the existing techniques are focusing on …
current cloud computing scenario. The majority of the existing techniques are focusing on …
Enabling personalized search over encrypted outsourced data with efficiency improvement
In cloud computing, searchable encryption scheme over outsourced data is a hot research
field. However, most existing works on encrypted search over outsourced cloud data follow …
field. However, most existing works on encrypted search over outsourced cloud data follow …