Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …
the academy and industry because it has several potential applications ranging from the …
An anonymous pre-authentication and post-authentication scheme assisted by cloud for medical IoT environments
The Internet of Things (IoT) environment assisted by a cloud server is an emerging
conceptual model which incorporates the benefits of both IoT and cloud. In such an …
conceptual model which incorporates the benefits of both IoT and cloud. In such an …
HTMLPhish: Enabling phishing web page detection by applying deep learning techniques on HTML analysis
Recently, the development and implementation of phishing attacks require little technical
skills and costs. This uprising has led to an ever-growing number of phishing attacks on the …
skills and costs. This uprising has led to an ever-growing number of phishing attacks on the …
[HTML][HTML] Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics
Phishing websites distribute unsolicited content and are frequently used to commit email
and internet fraud. Detecting them before any user information is submitted is critical …
and internet fraud. Detecting them before any user information is submitted is critical …
A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …
based telecare medicine information systems (TMISs). Biometric is one of the most …
Designing fine-grained access control for software-defined networks using private blockchain
Emerging next-generation Internet yields proper administration of a wide-ranging dynamic
network to assist rapid ubiquitous resource accessibility, whilst providing higher channel …
network to assist rapid ubiquitous resource accessibility, whilst providing higher channel …
A secure biometrics and PUFs-based authentication scheme with key agreement for multi-server environments
The emergence of multi-server authentication key protocol schemes provides a viable
environment for users to easily access the services of multiple legitimate servers through a …
environment for users to easily access the services of multiple legitimate servers through a …
Suppressed K-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing
KM Prabha, PV Saraswathi - Computer Communications, 2020 - Elsevier
Security and privacy-preservation is a significant problem to be solved in the cloud when
accessing data services. The existing authentication technique verifies the client identity …
accessing data services. The existing authentication technique verifies the client identity …
Provably secure multi-server authentication protocol using fuzzy commitment
Remote user authentication is a cryptographic mechanism through which a remote server
verifies the legitimacy of an authorized user over an insecure communication channel. Most …
verifies the legitimacy of an authorized user over an insecure communication channel. Most …
An efficient fractional Chebyshev chaotic map-based three-factor session initiation protocol for the human-centered IoT architecture
One of the most frequently used signaling techniques for initiating, sustaining, and
dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are …
dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are …