Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
State of the art: secure mobile payment
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …
and anywhere. While providing great convenience, mobile payment also brings many …
Block-secure: Blockchain based scheme for secure P2P cloud storage
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …
To tackle with large-scale data, more and more applications choose to enlarge the storage …
Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications
Mobile cloud computing (MCC) allows mobile users to have on-demand access to cloud
services. A mobile cloud model helps in analyzing the information regarding the patients' …
services. A mobile cloud model helps in analyzing the information regarding the patients' …
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
A secure authenticated key exchange protocol is an essential key to bootstrap a secure
wireless communication. Various research have been conducted to study the efficiency and …
wireless communication. Various research have been conducted to study the efficiency and …
Design of a provably secure biometrics-based multi-cloud-server authentication scheme
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our
data-driven society, and one research challenge is to design efficient security solution that …
data-driven society, and one research challenge is to design efficient security solution that …
On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services
Secure and efficient lightweight user authentication protocol for mobile cloud computing
becomes a paramount concern due to the data sharing using Internet among the end users …
becomes a paramount concern due to the data sharing using Internet among the end users …
Trust architecture and reputation evaluation for internet of things
Abstract Internet of Things (IoT) represents a fundamental infrastructure and set of
techniques that support innovative services in various application domains. Trust …
techniques that support innovative services in various application domains. Trust …
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
The most vital concern in the realization of the Internet of Things (IoT) is to encounter the
disparate communication systems and technologies. Interoperability solutions such as …
disparate communication systems and technologies. Interoperability solutions such as …
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
Significant advances in wireless communication technologies have led to the emergence
and proliferation of a wide range of mobile devices and mobile services. However, the use of …
and proliferation of a wide range of mobile devices and mobile services. However, the use of …
A novel visual medical image encryption for secure transmission of authenticated watermarked medical images
S Priya, B Santhi - Mobile networks and applications, 2021 - Springer
Secure medical data transmission is the important criteria in tele-medicine. It is helpful for
getting the exact medical information at the remote specialist's side from the local doctor …
getting the exact medical information at the remote specialist's side from the local doctor …