Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review of homomorphic encryption and its contributions in healthcare industry
K Munjal, R Bhatia - Complex & Intelligent Systems, 2023 - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …
use. Availability and accessibility of resources with the reduction of substantial work is one of …
A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
A survey on IoT security: application areas, security threats, and solution architectures
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …
can be empowered to create, receive, and exchange data in a seamless manner. Various …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Achieving privacy-preserving and verifiable support vector machine training in the cloud
With the proliferation of machine learning, the cloud server has been employed to collect
massive data and train machine learning models. Several privacy-preserving machine …
massive data and train machine learning models. Several privacy-preserving machine …
Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
Security and privacy in smart health: Efficient policy-hiding attribute-based access control
With the rapid development of the Internet of Things and cloud computing technologies,
smart health (s-health) is expected to significantly improve the quality of health care …
smart health (s-health) is expected to significantly improve the quality of health care …
The security of big data in fog-enabled IoT applications including blockchain: A survey
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
power grid, is changing the perception of what constitutes critical infrastructure. The rising …