Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Attacks and defenses in short-range wireless technologies for IoT
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
Security threats in Bluetooth technology
SS Hassan, SD Bibon, MS Hossain… - Computers & Security, 2018 - Elsevier
Bluetooth allows connecting mobile devices in short range in order to transfer files/videos. It
is now a popular means of short range wireless communication. Although Bluetooth is …
is now a popular means of short range wireless communication. Although Bluetooth is …
Sok: a systematic literature review of bluetooth security threats and mitigation measures
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …
wearable technologies. Users of these devices are often unaware of the security …
Technologies and applications in wireless biosensors for real-time health monitoring
Wireless biosensing has emerged as a critical technology due to its ability to provide real-
time, continuous monitoring of physiological parameters without the constraints of wired …
time, continuous monitoring of physiological parameters without the constraints of wired …
NFC based secure mobile healthcare system
With the recent increase in usage of mobile devices especially in develo** countries, they
can be used for an efficient healthcare management. In this work, we have proposed a novel …
can be used for an efficient healthcare management. In this work, we have proposed a novel …
[PDF][PDF] Wireless networks: developments, threats and countermeasures
MM Noor, WH Hassan - … Journal of Digital Information and Wireless …, 2013 - academia.edu
This paper discusses current threats in wireless networks and some academia research
reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man …
reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man …
Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison
Authenticated key exchange protocols play an important role in securing communications
and are extensively deployed for use in various real-world network applications. Diffie …
and are extensively deployed for use in various real-world network applications. Diffie …
[PDF][PDF] Current threats of wireless networks
MM Noor, WH Hassan - The Third international conference on digital …, 2013 - core.ac.uk
This paper discusses current threats in wireless networks. Advancement and
countermeasures for each threat such as sniffing, Man In the Middle Attack (MITM), Rogue …
countermeasures for each threat such as sniffing, Man In the Middle Attack (MITM), Rogue …
A robust NFC-based personalized IPTV service system
KH Yeh, NW Lo, CK Wang - Multimedia Tools and Applications, 2018 - Springer
Abstract Internet Protocol Television (IPTV) is becoming a platform that changes the way we
obtain information and entertainment, and offers interactive features and personalized …
obtain information and entertainment, and offers interactive features and personalized …
[PDF][PDF] Near field communication based android API healthcare system
B Kartik, J Bhargav, M Mahajan… - … Journal of Research in …, 2015 - researchgate.net
With the recent increase in usage of mobile devices especially in develo** countries, they
can be used for an efficient healthcare management. In this work, we have proposed a novel …
can be used for an efficient healthcare management. In this work, we have proposed a novel …