Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions
Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and
applications. The increasing number of vehicles has made the vehicular network diverse …
applications. The increasing number of vehicles has made the vehicular network diverse …
Indistinguishability obfuscation from well-founded assumptions
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …
programs into unintelligible ones while preserving functionality. It is a fascinating and …
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
The blooming trend of smart grid deployment is engaged by the evolution of the network
technology, as the connected environment offers various alternatives for electrical data …
technology, as the connected environment offers various alternatives for electrical data …
On the size of pairing-based non-interactive arguments
J Groth - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
Non-interactive arguments enable a prover to convince a verifier that a statement is true.
Recently there has been a lot of progress both in theory and practice on constructing highly …
Recently there has been a lot of progress both in theory and practice on constructing highly …
[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …
(VANETs). Today car manufacturers have already started to equip vehicles with …
Redactable blockchain–or–rewriting history in bitcoin and friends
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …
of any number of blocks in decentralized services exploiting the blockchain technology. As …
On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: A comprehensive survey
Blockchain is a decentralized distributed ledger that combines multiple technologies,
including chain data structures, P2P networks, consensus algorithms, cryptography, and …
including chain data structures, P2P networks, consensus algorithms, cryptography, and …
Blockchain-based secure data storage protocol for sensors in the industrial internet of things
J Lu, J Shen, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) that introduces Internet of Things (IoT) technology into
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …
industrial environments is beneficial to construct smart factories. It utilizes various sensors to …
A secure authentication framework to guarantee the traceability of avatars in metaverse
Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a
variety of services acting as an avatar. To build a secure living habitat, it's vital to ensure the …
variety of services acting as an avatar. To build a secure living habitat, it's vital to ensure the …