Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A new one time password mechanism for client-server applications
Abstract OTP (One Time Passwords) are very important in today's scenario in various
applications like in financial transactions, e-commerce etc. They are used for enhancing the …
applications like in financial transactions, e-commerce etc. They are used for enhancing the …
[PDF][PDF] Comprehensive analysis of continuous authentication for mobile devices
Continuous mobile authentication is an imperative aspect of ensuring the security and
privacy of data in the contemporary mobile computing landscape. With the proliferation of …
privacy of data in the contemporary mobile computing landscape. With the proliferation of …
Security and privacy issues of electronic healthcare system: a survey
In today's digital environment, the paper-based healthcare system shifts towards the
Electronic Healthcare System (EHS). The EHS features will allow its user to access the …
Electronic Healthcare System (EHS). The EHS features will allow its user to access the …
Machine learning based MAC protocol design for pipeline leakage detection in smart city project
The integration of WSN with IoT is growing exponentially for implementing real time
applications in today's world. Also an Intelligent WSN design is required for implementing …
applications in today's world. Also an Intelligent WSN design is required for implementing …
MultiStage Authentication to Enhance Security of Virtual Machines in Cloud Environment
The adoption of cloud computing in different areas has shown benefits and given solutions
to applications. The cloud provider offers virtualized platforms through virtual machines for …
to applications. The cloud provider offers virtualized platforms through virtual machines for …
An improved (T-DelPHI) for efficient and secure routing in MANETs
N Singh, A Singh - International Journal of Information Systems & …, 2019 - papers.ssrn.com
In this paper a novel protocol T-DelPHI has been designed with reference to paper. A
wormhole attack is one of the harmful attacks in ad hoc network within routing of packets …
wormhole attack is one of the harmful attacks in ad hoc network within routing of packets …
Multi-Factor Biometrics for Enhanced User Authentication in an E-Health System, Ghana
For most existing computer systems, once the user's identity is verified at login, the system
resources are available to that user until he/she exits the system. In high-risk environments …
resources are available to that user until he/she exits the system. In high-risk environments …