Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
A survey on wireless security: Technical challenges, recent advances, and future trends
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …
accessible to both authorized and illegitimate users. This completely differs from a wired …
A secure authentication protocol for internet of vehicles
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting
messages for the vehicles on roads. However, as the data are transmitted in an insecure …
messages for the vehicles on roads. However, as the data are transmitted in an insecure …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
The idea of the Internet of Things (IOT) notion is that everything within the global network is
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …
An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT
Emerging technologies rapidly change the essential qualities of modern societies in terms of
smart environments. To utilize the surrounding environment data, tiny sensing devices and …
smart environments. To utilize the surrounding environment data, tiny sensing devices and …
HomeChain: A blockchain-based secure mutual authentication system for smart homes
Increasingly, governments around the world, particularly in technologically advanced
countries, are exploring or implementing smart homes, or the related smart facilities for the …
countries, are exploring or implementing smart homes, or the related smart facilities for the …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
In 2014, Turkanovic et al. proposed a smart card-based authentication scheme for
heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it …
heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it …