Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on the state-of-the-art privacy-preserving approaches in the e-health clouds
A Abbas, SU Khan - IEEE journal of Biomedical and health …, 2014 - ieeexplore.ieee.org
Cloud computing is emerging as a new computing paradigm in the healthcare sector
besides other business domains. Large numbers of health organizations have started …
besides other business domains. Large numbers of health organizations have started …
A threshold anonymous authentication protocol for VANETs
Vehicular ad hoc networks (VANETs) have recently received significant attention in
improving traffic safety and efficiency. However, communication trust and user privacy still …
improving traffic safety and efficiency. However, communication trust and user privacy still …
A performance evaluation of local descriptors
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation
This article is a position paper on the current security issues in Vehicular Ad hoc Networks
(VANETs). VANETs face many interesting research challenges in multiple areas, from …
(VANETs). VANETs face many interesting research challenges in multiple areas, from …
Short group signatures
We construct a short group signature scheme. Signatures in our scheme are approximately
the size of a standard RSA signature with the same security. Security of our group signature …
the size of a standard RSA signature with the same security. Security of our group signature …
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
A credential system is a system in which users can obtain credentials from organizations
and demonstrate possession of these credentials. Such a system is anonymous when …
and demonstrate possession of these credentials. Such a system is anonymous when …
HDMA: Hybrid D2D message authentication scheme for 5G-enabled VANETs
The fifth-generation (5G) mobile communication technology with higher capacity and data
rate, ultra-low device to device (D2D) latency, and massive device connectivity will greatly …
rate, ultra-low device to device (D2D) latency, and massive device connectivity will greatly …
Signature schemes and anonymous credentials from bilinear maps
We propose a new and efficient signature scheme that is provably secure in the plain model.
The security of our scheme is based on a discrete-logarithm-based assumption put forth by …
The security of our scheme is based on a discrete-logarithm-based assumption put forth by …
Dynamic accumulators and application to efficient revocation of anonymous credentials
We introduce the notion of a dynamic accumulator. An accumulator scheme allows one to
hash a large set of inputs into one short value, such that there is a short proof that a given …
hash a large set of inputs into one short value, such that there is a short proof that a given …
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was
adopted by the Trusted Computing Group (TCG) as the method for remote authentication of …
adopted by the Trusted Computing Group (TCG) as the method for remote authentication of …