Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Location-based authentication and authorization using smart phones
F Zhang, A Kondoro, S Muftic - … on trust, security and privacy in …, 2012 - ieeexplore.ieee.org
Authentication and authorization are two of the most important security features for mobile
transaction systems. Most commonly, these schemes depend on three factors: what you …
transaction systems. Most commonly, these schemes depend on three factors: what you …
Google book search: Document understanding on a massive scale
L Vincent - … International Conference on Document Analysis and …, 2007 - ieeexplore.ieee.org
Unveiled in late 2004, Google Book Search is an ambitious program to make all the world's
books discoverable online. The sheer scale of the problem brings a number of unique …
books discoverable online. The sheer scale of the problem brings a number of unique …
Iot devices proximity authentication in ad hoc network environment
Internet of Things (IoT) is a distributed communication technology system that offers the
possibility for physical devices (eg, vehicles, home appliances sensors, actuators, etc.) …
possibility for physical devices (eg, vehicles, home appliances sensors, actuators, etc.) …
Obfuscation of sensitive human-perceptual output
AIA Wang, M Mitchell, P Reiher - US Patent 10,025,952, 2018 - Google Patents
The present invention includes a system and method for defending against unwanted
observations of the information conveyed by electronic devices. The system allows users to …
observations of the information conveyed by electronic devices. The system allows users to …
Comparative analysis of localization techniques used in lbs
M Kenan - 2021 5th International Conference on Computing …, 2021 - ieeexplore.ieee.org
In the past two decades, there has been rapid growth in the number of mobile devices. Most
of these mobile devices can sense different types of wireless signals (eg, GPS, Wi-Fi …
of these mobile devices can sense different types of wireless signals (eg, GPS, Wi-Fi …
Location-based risk assessment for mobile authentication
Mobile devices offer access to our digital lives and thus need to be protected against the risk
of unauthorized physical access by applying strong authentication, which in turn adversely …
of unauthorized physical access by applying strong authentication, which in turn adversely …
Architecture for continuous authentication in location-based services
Location-based services are widely used today. The huge growth of location-based services
is enabled by the growth of the usage of mobile devices. Moreover, these devices can sense …
is enabled by the growth of the usage of mobile devices. Moreover, these devices can sense …
A survey in localization techniques used in location-based access control
MK Almutairi, S Bhattacharjee - 2021 IEEE World AI IoT …, 2021 - ieeexplore.ieee.org
There has been a huge growth in the number of mobile devices in the last few years. These
mobile devices are equipped with various hardware that allows them to sense and receive …
mobile devices are equipped with various hardware that allows them to sense and receive …
Defining and investigating device comfort
Device Comfort is a concept that uses an enhanced notion of trust to allow a personal (likely
mobile) device to better reason about the state of interactions and actions between it, its …
mobile) device to better reason about the state of interactions and actions between it, its …
Authdna: An adaptive authentication service for any identity server
H De Silva, DC Wittebron, AMR Lahiru… - … on Advancements in …, 2019 - ieeexplore.ieee.org
Adaptive authentication refers to the way that configures two factors or multi-factor
authentication, based on the user's risk profile. One of the most pressing concerns in modern …
authentication, based on the user's risk profile. One of the most pressing concerns in modern …