Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
IoT-enhanced transport and monitoring of medicine using sensors, MQTT, and secure short message service
Since its inception more than a decade ago, Internet of Things (IoT) technology has been
guiding people in the development of a world full of smart solutions in which all devices and …
guiding people in the development of a world full of smart solutions in which all devices and …
Implementing RLWE-based schemes using an RSA co-processor
We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by
exploiting the availability of fast long integer multiplication. Such co-processors are …
exploiting the availability of fast long integer multiplication. Such co-processors are …
[PDF][PDF] Black-box wallets: Fast anonymous two-way payments for constrained devices
M Hoffmann, M Klooß, M Raiber, A Rupp - Proceedings on privacy …, 2020 - orbilu.uni.lu
Black-box accumulation (BBA) is a building block which enables a privacy-preserving
implementation of point collection and redemption, a functionality required in a variety of …
implementation of point collection and redemption, a functionality required in a variety of …
Provably unlinkable smart card-based payments
The most prevalent smart card-based payment method, EMV, currently offers no privacy to
its users. Transaction details and the card number are sent in cleartext, enabling the profiling …
its users. Transaction details and the card number are sent in cleartext, enabling the profiling …
Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices
Cyber security and privacy protection play a crucial role in modern communication systems.
While it is relatively easy to secure classical networks, it is a hard problem to provide even …
While it is relatively easy to secure classical networks, it is a hard problem to provide even …
Unlinkability of an improved key agreement protocol for EMV 2nd gen payments
To address known privacy problems with the EMV standard, EMVCo have proposed a
Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future …
Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future …
Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card
Java Card stands out as a good choice for the development of smart card applications due
to the high interoperability between different manufacturers, its security, and wide support of …
to the high interoperability between different manufacturers, its security, and wide support of …
Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials
With the daily increase in digitalization and integration of the physical and digital worlds, we
need to better protect users' privacy and identity. Attribute-based Credentials (ABCs) seem …
need to better protect users' privacy and identity. Attribute-based Credentials (ABCs) seem …
Privacy ABCs: Now Ready for Your Wallets!
The paper deals with privacy-enhanced electronic access control technologies, in particular
cryptographic schemes that allow verification of users' personal attributes without their …
cryptographic schemes that allow verification of users' personal attributes without their …
Performance analysis of pairing-based elliptic curve cryptography on constrained devices
The paper deals with the implementation aspects of the bilinear pairing operation over an
elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters …
elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters …