Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Key management for beyond 5G mobile small cells: A survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …
are unanimous that densification of mobile networks is the way forward. The densification …
A survey on peer-to-peer key management for mobile ad hoc networks
JVD Merwe, D Dawoud, S McDonald - ACM computing surveys (CSUR), 2007 - dl.acm.org
The article reviews the most popular peer-to-peer key management protocols for mobile ad
hoc networks (MANETs). The protocols are subdivided into groups based on their design …
hoc networks (MANETs). The protocols are subdivided into groups based on their design …
Dumbo-ng: Fast asynchronous bft consensus with throughput-oblivious latency
Despite recent progresses of practical asynchronous Byzantine-fault tolerant (BFT)
consensus, the state-of-the-art designs still suffer from suboptimal performance. Particularly …
consensus, the state-of-the-art designs still suffer from suboptimal performance. Particularly …
Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
Universal atomic swaps: Secure exchange of coins across all blockchains
SAK Thyagarajan, G Malavolta… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Trading goods lies at the backbone of the modern economy and the recent advent of
cryptocurrencies has opened the door for trading decentralized (digital) assets: A large …
cryptocurrencies has opened the door for trading decentralized (digital) assets: A large …
Sok: Distributed randomness beacons
Motivated and inspired by the emergence of blockchains, many new protocols have recently
been proposed for generating publicly verifiable randomness in a distributed yet secure …
been proposed for generating publicly verifiable randomness in a distributed yet secure …
[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
While threshold signature schemes have been presented before, there has never been an
optimal threshold signature algorithm for DSA. The properties of DSA make it quite …
optimal threshold signature algorithm for DSA. The properties of DSA make it quite …
An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks without pairings
NW Lo, JL Tsai - IEEE Transactions on Intelligent …, 2015 - ieeexplore.ieee.org
Constructing intelligent and efficient transportation systems for modern metropolitan areas
has become a very important quest for nations possessing metropolitan cities with ever …
has become a very important quest for nations possessing metropolitan cities with ever …
Identity-based encryption from the Weil pairing
We propose a fully functional identity-based encryption scheme (IBE). The scheme has
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …
chosen ciphertext security in the random oracle model assuming an elliptic curve variant of …