Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
State of the art: secure mobile payment
W Liu, X Wang, W Peng - IEEE Access, 2020 - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …
and anywhere. While providing great convenience, mobile payment also brings many …
Multimodal biometric authentication: A review
S Pahuja, N Goel - AI Communications, 2024 - journals.sagepub.com
Critical applications ranging from sensitive military data to restricted area access demand
selective user authentication. The prevalent methods of tokens, passwords, and other …
selective user authentication. The prevalent methods of tokens, passwords, and other …
Recent trends in user authentication–a survey
Recent advancements in technology have led to profusion of personal computing devices,
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
such as smart phone, tablet, watch, glasses, and many more. This has contributed to the …
True lies in geospatial big data: detecting location spoofing in social media
B Zhao, DZ Sui - Annals of GIS, 2017 - Taylor & Francis
Location spoofing refers to the act of intentionally falsifying one's actual locational
information. The proliferation of location spoofing in recent years has stirred debate about …
information. The proliferation of location spoofing in recent years has stirred debate about …
[HTML][HTML] Physical unclonable function and hashing are all you need to mutually authenticate iot devices
Internet of Things (IoT) has become the driving force in modern day technology with an
increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used …
increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used …
Authentication systems and methods using location matching
J Chitalia, A Ansari - US Patent 10,922,672, 2021 - Google Patents
According to some embodiments of the invention, an authentication method is provided.
Transaction data for a transaction is received at communication device from an access …
Transaction data for a transaction is received at communication device from an access …
[HTML][HTML] Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things
Communication between connected objects in the Internet of Things (IoT) often requires
secure and reliable authentication mechanisms to verify identities of entities and prevent …
secure and reliable authentication mechanisms to verify identities of entities and prevent …
[HTML][HTML] Securing remote access to information systems of critical infrastructure using two-factor authentication
R Bruzgiene, K Jurgilas - Electronics, 2021 - mdpi.com
Information systems of critical infrastructure provide services on which the core functions of a
state and its economy depend as well as welfare of society. Such systems are becoming an …
state and its economy depend as well as welfare of society. Such systems are becoming an …
An investigation of shoulder surfing attacks on touch-based unlock events
This paper contributes to our understanding of user-centered attacks on smartphones. In
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …
particular, we investigate the likelihood of so-called shoulder surfing attacks during touch …
Anomaly detection for smartphone data streams
Smartphones centralize a great deal of users' private information and are thus a primary
target for cyber-attack. The main goal of the attacker is to try to access and exfiltrate the …
target for cyber-attack. The main goal of the attacker is to try to access and exfiltrate the …