Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy-preservation techniques for IoT devices: a systematic map** study
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources
A Alamer - Internet of Things, 2024 - Elsevier
The rise in malware attacks presents a growing security threat in today's digital landscape,
emphasizing the need for advanced malware detection methodology. While numerous …
emphasizing the need for advanced malware detection methodology. While numerous …
A context-aware information-based clone node attack detection scheme in Internet of Things
The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract
interest across a range of applications, including smart homes, smart transportation, smart …
interest across a range of applications, including smart homes, smart transportation, smart …
A privacy-preserving scheme to support the detection of multiple similar request-real-time services in IoT application systems
Abstract Many Internet of Things (IoT) network and security studies have suggested to
design a secure transmission scheme based on cryptographic methodology to guarantee …
design a secure transmission scheme based on cryptographic methodology to guarantee …
Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization
Abstract Mobile Ad-Hoc Networks (MANETs) are useful and appropriate, especially for
complex scenarios, including law, military enforcement as well disaster recovery, and …
complex scenarios, including law, military enforcement as well disaster recovery, and …
An authenticated group shared key mechanism based on a combiner for hash functions over the industrial internet of things
W Ali, AA Ahmed - Processes, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) provides internet connectivity for instruments, digital
machines, and any other manufactured object to enable intelligent industrial operations to …
machines, and any other manufactured object to enable intelligent industrial operations to …
A privacy protection scheme for electricity transactions in the microgrid day-ahead market based on consortium blockchain
B Wang, H Liu, S Zhang - International Journal of Electrical Power & Energy …, 2022 - Elsevier
The electricity trading plan made by the users in the microgrid day-ahead market (DAM)
contains the electricity consumption information of the future day. Aiming at the problem that …
contains the electricity consumption information of the future day. Aiming at the problem that …
High-speed batch verification for discrete-logarithm-based signatures via Multi-Scalar Multiplication Algorithm
Digital signatures are widely used in a variety of applications necessitating authentication.
However, the amount of data is steadily increasing in domains like IoT, blockchain, e …
However, the amount of data is steadily increasing in domains like IoT, blockchain, e …
[HTML][HTML] Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things
Cybersecurity protocols enable several levels of protection against cyberattacks (digital
attacks) that spread across network devices, platform programs, and network applications …
attacks) that spread across network devices, platform programs, and network applications …
On-demand anonymous access and roaming authentication protocols for 6G satellite–ground integrated networks
Y Tao, H Du, J Xu, L Su, B Cui - Sensors, 2023 - mdpi.com
Satellite–ground integrated networks (SGIN) are in line with 6th generation wireless network
technology (6G) requirements. However, security and privacy issues are challenging with …
technology (6G) requirements. However, security and privacy issues are challenging with …