Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
Secure data dissemination techniques for IoT applications: Research challenges and opportunities
U Bodkhe, S Tanwar - Software: Practice and Experience, 2021 - Wiley Online Library
Summary Internet of Things (IoT) connects different objects in the physical world to the
Internet, and various Internet protocols are used to provide communication services to a …
Internet, and various Internet protocols are used to provide communication services to a …
Delegatable pseudorandom functions and applications
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
In this work, we show how to use indistinguishability obfuscation to build multiparty key
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …
Robust encryption
We provide a provable-security treatment of “robust” encryption. Robustness means it is
hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a …
hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a …
Post-quantum anonymity of Kyber
Kyber is a key-encapsulation mechanism (KEM) that was recently selected by NIST in its
PQC standardization process; it is also the only scheme to be selected in the context of …
PQC standardization process; it is also the only scheme to be selected in the context of …
Anonymous, robust post-quantum public key encryption
A core goal of the NIST PQC competition is to produce PKE schemes which, even if attacked
with a large-scale quantum computer, maintain the security guarantees needed by …
with a large-scale quantum computer, maintain the security guarantees needed by …
Differentially private smart metering with fault tolerance and range-based filtering
Smart grid enables two-way communications between operation centers and smart meters
to collect power consumption and achieve demand response to improve flexibility, reliability …
to collect power consumption and achieve demand response to improve flexibility, reliability …
Low overhead broadcast encryption from multilinear maps
We use multilinear maps to provide a solution to the long-standing problem of public-key
broadcast encryption where all parameters in the system are small. In our constructions …
broadcast encryption where all parameters in the system are small. In our constructions …
Outsider-anonymous broadcast encryption with sublinear ciphertexts
In the standard setting of broadcast encryption, information about the receivers is transmitted
as part of the ciphertext. In several broadcast scenarios, however, the identities of the users …
as part of the ciphertext. In several broadcast scenarios, however, the identities of the users …