Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on remote data auditing in single cloud server: Taxonomy and open issues
Cloud computing has emerged as a computational paradigm and an alternative to the
conventional computing with the aim of providing reliable, resilient infrastructure, and with …
conventional computing with the aim of providing reliable, resilient infrastructure, and with …
Accumulators from bilinear pairings and applications
L Nguyen - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We propose a dynamic accumulator scheme from bilinear pairings and use it to construct an
identity-based (ID-based) ring signature scheme with constant-size signatures and to …
identity-based (ID-based) ring signature scheme with constant-size signatures and to …
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud computing
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Efficient pairing computation on supersingular abelian varieties
PSLM Barreto, SD Galbraith, CÓ hÉigeartaigh… - Designs, Codes and …, 2007 - Springer
We present a general technique for the efficient computation of pairings on Jacobians of
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …
A new two-party identity-based authenticated key agreement
N McCullagh, PSLM Barreto - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We present a new two-party identity-based key agreement that is more efficient than
previously proposed schemes. It is inspired on a new identity-based key pair derivation …
previously proposed schemes. It is inspired on a new identity-based key pair derivation …
Computing the Tate pairing
M Scott - Cryptographers' Track at the RSA Conference, 2005 - Springer
We describe, in detail sufficient for easy implementation, a fast method for calculation of the
Tate pairing, as required for pairing-based cryptographic protocols. We point out various …
Tate pairing, as required for pairing-based cryptographic protocols. We point out various …
ARSA: An attack-resilient security architecture for multihop wireless mesh networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable
and effective solution to ubiquitous broadband Internet access. This paper addresses the …
and effective solution to ubiquitous broadband Internet access. This paper addresses the …
[PDF][PDF] Attacks against OLSR: Distributed key management for security
C Adjih, D Raffo, P Muhlethaler - 2nd OLSR Interop/Workshop …, 2005 - researchgate.net
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create
spontaneously a larger network, larger than radio range, in which communication with each …
spontaneously a larger network, larger than radio range, in which communication with each …
A secure and lightweight NDN-based vehicular network using edge computing and certificateless signcryption
Named data networking (NDN), which is an implementation of information-centric
networking (ICN), has emerged as a promising new direction in networking as a result of the …
networking (ICN), has emerged as a promising new direction in networking as a result of the …