Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security of vehicular ad-hoc networks: A comprehensive survey
Vehicles equipped with significant computing, communication and sensing (also known as
“smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The …
“smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The …
A survey of applications of identity-based cryptography in mobile ad-hoc networks
Security in mobile ad-hoc networks (MANETs) continues to attract attention after years of
research. Recent advances in identity-based cryptography (IBC) sheds light on this problem …
research. Recent advances in identity-based cryptography (IBC) sheds light on this problem …
Learning an invariant hilbert space for domain adaptation
This paper introduces a learning scheme to construct a Hilbert space (ie, a vector space
along its inner product) to address both unsupervised and semi-supervised domain …
along its inner product) to address both unsupervised and semi-supervised domain …
A key management and secure routing integrated framework for mobile ad-hoc networks
Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-
hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads …
hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads …
ISDSR+: improving the security and availability of secure routing protocol
In ad hoc networks that allow devices to dynamically configure networks via wireless
communication, a secure routing protocol is a technology that guarantees the validity of …
communication, a secure routing protocol is a technology that guarantees the validity of …
A secure routing protocol in proactive security approach for mobile ad-hoc networks
Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of
research. We therefore propose to design a secure routing protocol in a new approach. This …
research. We therefore propose to design a secure routing protocol in a new approach. This …
Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols
To establish trusted routes, secure routing protocols have been extensively researched.
These protocols employ authentication mechanisms, such as digital signatures, to thwart …
These protocols employ authentication mechanisms, such as digital signatures, to thwart …
An integrated key management and secure routing framework for mobile ad-hoc networks
Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-
hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads …
hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads …
Using domain partitioning in wrapper design for IP cores under power constraints
TE Yu, T Yoneda, D Zhao… - 25th IEEE VLSI Test …, 2007 - ieeexplore.ieee.org
This paper presents a novel design method for power-aware test wrappers targeting
embedded cores with multiple clock domains. We show that effective partitioning of clock …
embedded cores with multiple clock domains. We show that effective partitioning of clock …
Performance evaluation for the signature algorithm of isdsr on raspberry pi
Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are
applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN …
applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN …