Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of multi-factor authentication in the Internet of Healthcare Things
Objective This review paper aims to evaluate existing solutions in healthcare authentication
and provides an insight into the technologies incorporated in Internet of Healthcare Things …
and provides an insight into the technologies incorporated in Internet of Healthcare Things …
A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)
ZA Almusaylim, N Zaman - Wireless networks, 2019 - Springer
The smart home is considered as an essential domain in Internet of Things (IoT)
applications, it is an interconnected home where all types of things interact with each other …
applications, it is an interconnected home where all types of things interact with each other …
Access control for IoT: A survey of existing research, dynamic policies and future directions
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …
environments. Access control plays a crucial role in granting access rights to users and …
Review of security and privacy for the Internet of Medical Things (IoMT)
G Hatzivasilis, O Soultatos, S Ioannidis… - … computing in sensor …, 2019 - ieeexplore.ieee.org
Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional
business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay …
business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay …
Blockchain for IoT access control: Recent trends and future research directions
With the rapid development of wireless sensor networks, smart devices, and traditional
information and communication technologies, there is tremendous growth in the use of …
information and communication technologies, there is tremendous growth in the use of …
Survey on existing authentication issues for cellular-assisted V2X communication
M Muhammad, GA Safdar - Vehicular Communications, 2018 - Elsevier
The integration of Internet of Things (IoT) into cellular network infrastructure is gaining much
attention from the research community and standardisation groups, where new cellular …
attention from the research community and standardisation groups, where new cellular …
A security authorization scheme for smart home Internet of Things devices
Abstract The Internet of Things (IoT) is becoming an important factor in many areas of our
society. IoT brings intelligence to critical aspects like transportation, industry, payments …
society. IoT brings intelligence to critical aspects like transportation, industry, payments …
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
Privacy enhancing technologies in the Internet of Things: Perspectives and challenges
SC Cha, TY Hsu, Y **ang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices have brought much efficiency and convenience to our daily
life. However, the devices may collect a myriad of data from people without their consent …
life. However, the devices may collect a myriad of data from people without their consent …
Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …