Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security and cryptographic perspective of Industrial-Internet-of-Things
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …
transportation efficiency, reduce energy consumption, and traffic accidents. However …
Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
Design of secure user authenticated key management protocol for generic IoT networks
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …
applications including smart home, smart city, smart grid, industrial Internet, connected …
Secure remote user authenticated key establishment protocol for smart home environment
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …
applications, such as smart living, smart health and smart transportation. Among all these …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
Government regulations in cyber security: Framework, standards and recommendations
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …
software as well as data (information) from cyber attacks (adversaries). A cyber security …
Provably secure authenticated key agreement scheme for smart grid
Due to the rapid development of wireless communication systems, authentication becomes
a key security component in smart grid environments. Authentication then plays an important …
a key security component in smart grid environments. Authentication then plays an important …