Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security and authentication in wireless body area networks
Abstract Wireless Body Area Networks (WBAN) is often envisioned as a paradigm shift from
the traditional healthcare system to the modern E-Healthcare system. The patient's vitals …
the traditional healthcare system to the modern E-Healthcare system. The patient's vitals …
A lightweight authentication protocol for UAV networks based on security and computational resource optimization
Y Lei, L Zeng, YX Li, MX Wang, H Qin - IEEE Access, 2021 - ieeexplore.ieee.org
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and
computing resource application efficiency of UAV a hot topic in the security field of the …
computing resource application efficiency of UAV a hot topic in the security field of the …
TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor
Security vulnerabilities associated with Internet of Medical Things (IoMT) may lead to health
disasters. The researchers already have designed several lightweight authentication …
disasters. The researchers already have designed several lightweight authentication …
[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …
software-related or template attacks at different vulnerable points in the biometric …
A review of supervised classification based on contrast patterns: Applications, trends, and challenges
Supervised classification based on Contrast Patterns (CP) is a trending topic in the pattern
recognition literature, partly because it contains an important family of both understandable …
recognition literature, partly because it contains an important family of both understandable …
Understanding security failures of multi-factor authentication schemes for multi-server environments
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
Securing electronic healthcare records: A mobile-based biometric authentication approach
Abstract In the Healthcare 4.0 era, recent breakthroughs in emerging and disruptive
technologies, such as Artificial Intelligence (AI), machine learning and robotics, have …
technologies, such as Artificial Intelligence (AI), machine learning and robotics, have …
ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments
A variety of three-factor smart-card based schemes, specifically designed for telecare
medicine information systems (TMIS) are available for remote user authentication. Most of …
medicine information systems (TMIS) are available for remote user authentication. Most of …
The application of multi-server authentication scheme in internet banking transaction environments
CH Tsai, PC Su - Information systems and e-business management, 2021 - Springer
Abstract Information and communication technology has altered businesses' operations,
with a host of established and new banks launching online banking products and services …
with a host of established and new banks launching online banking products and services …
A cloud-guided feature extraction approach for image retrieval in mobile edge computing
Mobile Edge Computing (MEC) can facilitate various important image retrieval applications
for mobile users by offloading partial computation tasks from resource-limited mobile …
for mobile users by offloading partial computation tasks from resource-limited mobile …