Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey on revocation in ciphertext-policy attribute-based encryption
Recently, using advanced cryptographic techniques to process, store, and share data
securely in an untrusted cloud environment has drawn widespread attention from academic …
securely in an untrusted cloud environment has drawn widespread attention from academic …
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control
J Li, D Han, Z Wu, J Wang, KC Li… - Future generation …, 2023 - Elsevier
With the increasing sales of the medical device market, the medical incidents caused by
passive medical devices are increasing, which needs to be solved from the medical device …
passive medical devices are increasing, which needs to be solved from the medical device …
Attribute based encryption with privacy protection and accountability for CloudIoT
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …
a very challenging task. More so when access and storage are performed through a cloud …
A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications
S Ganapathy - Computer Networks, 2019 - Elsevier
Cloud computing and Internet of Things (IoT) are emerging technologies which have the
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …
Privacy-preserving authentication and key agreement protocols for D2D group communications
Device-to-Device (D2D) communications play a key role in the next generation mobile
communication networks and wireless systems (5G) and the Internet of Things ecosystem …
communication networks and wireless systems (5G) and the Internet of Things ecosystem …
Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption
As cloud computing becomes prevalent, more and more data owners are likely to outsource
their data to a cloud server. However, to ensure privacy, the data should be encrypted before …
their data to a cloud server. However, to ensure privacy, the data should be encrypted before …
Decision tree based user-centric security solution for critical IoT infrastructure
Data processing in real-time brings better business modeling and an intuitive plan of action.
Internet of things (IoT), being a source of sensitive data collected and communicated through …
Internet of things (IoT), being a source of sensitive data collected and communicated through …
Towards differential access control and privacy-preserving for secure media data sharing in the cloud
The development of cloud computing techniques has promoted the continuous sharing of a
tremendous amount of media data. However, the involved parties in such processes usually …
tremendous amount of media data. However, the involved parties in such processes usually …
Efficient privacy-preserving access control scheme in electronic health records system
Y Ming, T Zhang - Sensors, 2018 - mdpi.com
The sharing of electronic health records (EHR) in cloud servers is an increasingly important
development that can improve the efficiency of medical systems. However, there are several …
development that can improve the efficiency of medical systems. However, there are several …
Securing the internet of vehicles through lightweight block ciphers
In recent years, the automotive industry has made significant investments in the Internet of
Things (IoT) paradigm, aiming to develop technologies and services for connected vehicles …
Things (IoT) paradigm, aiming to develop technologies and services for connected vehicles …