Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
Post-quantum cryptography
DJ Bernstein, T Lange - Nature, 2017 - nature.com
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …
medical devices. However, many commonly used cryptosystems will be completely broken …
zkbridge: Trustless cross-chain bridges made practical
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over
1 trillion dollars, major institution investors taking interests, and global impacts on …
1 trillion dollars, major institution investors taking interests, and global impacts on …
Internet of Things: A survey on the security of IoT frameworks
M Ammar, G Russello, B Crispo - Journal of information security and …, 2018 - Elsevier
Abstract The Internet of Things (IoT) is heavily affecting our daily lives in many domains,
ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety …
ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety …
Enhancing bitcoin security and performance with strong consistency via collective signing
While showing great promise, Bitcoin requires users to wait tens of minutes for transactions
to commit, and even then, offering only probabilistic guarantees. This paper introduces …
to commit, and even then, offering only probabilistic guarantees. This paper introduces …
Identity inference of genomic data using long-range familial searches
Consumer genomics databases have reached the scale of millions of individuals. Recently,
law enforcement authorities have exploited some of these databases to identify suspects via …
law enforcement authorities have exploited some of these databases to identify suspects via …
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …
Simple schnorr multi-signatures with applications to bitcoin
We describe a new Schnorr-based multi-signature scheme (ie, a protocol which allows a
group of signers to produce a short, joint signature on a common message) called MuSig …
group of signers to produce a short, joint signature on a common message) called MuSig …
A formal security analysis of the signal messaging protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
Ring confidential transactions
S Noether, A Mackenzie - Ledger, 2016 - ledger.pitt.edu
This article introduces a method of hiding transaction amounts in the strongly decentralized
anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is …
anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is …