Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT
The safety of medical data and equipment plays a vital role in today's world of Medical
Internet of Things (MIoT). These IoT devices have many constraints (eg, memory size …
Internet of Things (MIoT). These IoT devices have many constraints (eg, memory size …
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
As an important part of Internet of Things, Radio Frequency Identification (RFID) system
employs low-cost RFID tag to communicate with everything containing animate and …
employs low-cost RFID tag to communicate with everything containing animate and …
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS
The healthcare environment now provides the facility for patients to communicate with
doctors from home via the Internet; this facility is very useful for seriously ill patients. Errors in …
doctors from home via the Internet; this facility is very useful for seriously ill patients. Errors in …
Closed-loop and open-loop authentication protocols for blockchain-based IoT systems
Designers of smart environments based on radio frequency identification devices have a
challenging task to build secure mutual authentication protocols. These systems are …
challenging task to build secure mutual authentication protocols. These systems are …
Study on the anti-theft technology of museum cultural relics based on Internet of Things
Z Liu, M Wang, S Qi, C Yang - IEEE Access, 2019 - ieeexplore.ieee.org
With the advancement of society, the museum has exhibited more and more cultural relics,
the number of visitors has also increased rapidly, and more and more criminals have stolen …
the number of visitors has also increased rapidly, and more and more criminals have stolen …
Dual cooperative RFID‐telecare medicine information system authentication protocol for healthcare environments
Abstract Radio Frequency IDentification (RFID) technology is used in a wide variety of
applications, more recently as a leading identification technology in healthcare …
applications, more recently as a leading identification technology in healthcare …
Radio frequency identification and mobile ad-hoc network: Theories and applications
K Kasemsap - Handbook of research on recent developments in …, 2017 - igi-global.com
This chapter explains the components of Radio Frequency Identification (RFID); the aspects
of RFID; the barriers to RFID utilization; the privacy and security issues of RFID; the RFID …
of RFID; the barriers to RFID utilization; the privacy and security issues of RFID; the RFID …
Security analysis of fan et al. lightweight rfid authentication protocol for privacy protection in iot
Abstract The designers of Radio-Frequency IDentification (RFID) systems have a
challenging task for proposing secure mutual authentication protocols for Internet of Things …
challenging task for proposing secure mutual authentication protocols for Internet of Things …
Review of the medical Internet of Things-based RFID security protocols
The security for medical data of patients plays a critical role in the medical field-based IoT.
Recently, researchers have proposed RFID-based authentication protocols for medical …
Recently, researchers have proposed RFID-based authentication protocols for medical …
HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation
M Dawoud, DT Altilar - Security and Communication Networks, 2016 - Wiley Online Library
The limited computational and memory resources available in the Radio Frequency
Identification (RFID) tags constitute the essential challenge to find a technique that satisfies …
Identification (RFID) tags constitute the essential challenge to find a technique that satisfies …