Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage
Password-based single-sign-on authentication has been widely applied in mobile
environments. It enables an identity server to issue authentication tokens to mobile users …
environments. It enables an identity server to issue authentication tokens to mobile users …
Secure password-protected encryption key for deduplicated cloud storage systems
In this article, we propose SPADE, an encrypted data deduplication scheme that resists
compromised key servers and frees users from the key management problem. Specifically …
compromised key servers and frees users from the key management problem. Specifically …
On the economics of offline password cracking
We develop an economic model of an offline password cracker which allows us to make
quantitative predictions about the fraction of accounts that a rational password attacker …
quantitative predictions about the fraction of accounts that a rational password attacker …
Security-enhanced electro-optic feedback phase chaotic system based on nonlinear coupling of two delayed interfering branches
C Wang, Y Ji, H Wang, L Bai - IEEE Photonics Journal, 2018 - ieeexplore.ieee.org
In this paper, a novel electro-optic feedback phase chaotic system based on nonlinear
coupling of two delayed interfering branches is proposed and analyzed by numerical …
coupling of two delayed interfering branches is proposed and analyzed by numerical …
Privsso: Practical single-sign-on authentication against subscription/access pattern leakage
G Gao, Y Zhang, Y Song, S Li - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with
an efficient way to authenticate themselves with different service providers and has been …
an efficient way to authenticate themselves with different service providers and has been …
Threshold pake with security against compromise of all servers
We revisit the notion of threshold Password-Authenticated Key Exchange (tPAKE), and we
extend it to augmented tPAKE (atPAKE), which protects password information even in the …
extend it to augmented tPAKE (atPAKE), which protects password information even in the …
PriParkRec: Privacy-preserving decentralized parking recommendation service
Insufficient parking space and traffic congestion are important usual suspects in our urban
life. Organisation and managing available parking spaces have raised a lot of awareness …
life. Organisation and managing available parking spaces have raised a lot of awareness …
Hardening password-based credential databases
Y Song, C Xu, Y Zhang, S Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We propose a protection mechanism for password-based credential databases maintained
by service providers against leakage, dubbed PCDL. In PCDL, each authentication …
by service providers against leakage, dubbed PCDL. In PCDL, each authentication …
Evaluation of password hashing schemes in open source web platforms
Nowadays, the majority of web platforms in the Internet originate either from CMS to easily
deploy websites or by web applications frameworks that allow developers to design and …
deploy websites or by web applications frameworks that allow developers to design and …