Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and trust management in opportunistic networks: a survey
Y Wu, Y Zhao, M Riguidel, G Wang… - Security and …, 2015 - Wiley Online Library
As a new networking paradigm, opportunistic networking communications have great vision
in animal migration tracking, mobile social networking, network communications in remote …
in animal migration tracking, mobile social networking, network communications in remote …
Social-aware stateless routingin pocket switched networks
Existing social-aware routing protocols for pocket switched networks make use of the
information about the social structure of the network deduced by state information of nodes …
information about the social structure of the network deduced by state information of nodes …
ePRIVO: An enhanced privacy-preserving opportunistic routing protocol for vehicular delay-tolerant networks
This paper proposes an enhanced PRIvacy preserVing opportunistic routing protocol
(ePRIVO) for vehicular delay-tolerant networks (VDTN). ePRIVO models a VDTN as a time …
(ePRIVO) for vehicular delay-tolerant networks (VDTN). ePRIVO models a VDTN as a time …
PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks
This paper introduces PRIVO, a PRIvacy-preserVing Opportunistic routing protocol for Delay
Tolerant Networks. PRIVO models a DTN as a time-varying neighboring graph where edges …
Tolerant Networks. PRIVO models a DTN as a time-varying neighboring graph where edges …
Opportunistic sensor networks: A survey on privacy and secure routing
MS Arafath, KUR Khan - 2017 2nd International Conference on …, 2017 - ieeexplore.ieee.org
With the advancement of mobile devices, a new paradigm called opportunistic sensor
networks emerges which has a lot of applications, such as Military surveillance, disaster …
networks emerges which has a lot of applications, such as Military surveillance, disaster …
Security in ambient intelligence and internet of things
SA Mohammed, MR Mahmood - Ambient Intelligence and …, 2022 - Wiley Online Library
Many paradigm‐s have shifted from the realm of computer networks to the world of Ambient
Intelligence and IoT. The network's and its deployment's perspective has shifted. A 60‐year …
Intelligence and IoT. The network's and its deployment's perspective has shifted. A 60‐year …
Authenticating with privacy protection in opportunistic networks
MH Guo, HT Liaw, MY Chiu… - 2015 11th International …, 2015 - ieeexplore.ieee.org
In this study, we propose an authentication mechanism with privacy protection for
opportunistic networks. It is applied for the short-term and limited-time wireless network …
opportunistic networks. It is applied for the short-term and limited-time wireless network …
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
For this demo, we present an implementation of the FairPlay framework for secure two-party
function computation on Android smartphones, which we call MobileFairPlay …
function computation on Android smartphones, which we call MobileFairPlay …
[HTML][HTML] Blossom: cluster-based routing for preserving privacy in opportunistic networks
B Kluss, S Rashidibajgan, T Hupperich - Journal of Sensor and Actuator …, 2022 - mdpi.com
Opportunistic networks are an enabler technology for typologies without centralized
infrastructure. Portable devices, such as wearable and embedded mobile systems, send …
infrastructure. Portable devices, such as wearable and embedded mobile systems, send …
Investigating the privacy versus forwarding accuracy tradeoff in opportunisticinterest-casting
Many mobile social networking applications are based on a “friend proximity detection” step,
according to which two mobile users try to jointly estimate whether they have friends in …
according to which two mobile users try to jointly estimate whether they have friends in …