Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A survey of fault tolerance in cloud computing
Cloud computing has brought about a transformation in the delivery model of information
technology from a product to a service. It has enabled the availability of various software …
technology from a product to a service. It has enabled the availability of various software …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
Secure multi-party computation: theory, practice and applications
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …
transportation system has promoted the rapid development of vehicular ad-hoc networks …
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …
wearable equipments are able to become new intelligent terminals to provide services for …
Enabling efficient and geometric range query with access control over encrypted spatial data
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
Bus-trajectory-based street-centric routing for message delivery in urban vehicular ad hoc networks
This paper focuses on the routing algorithm for the communications between vehicles and
places in urban vehicular ad hoc networks. As one of the basic transportation facilities in an …
places in urban vehicular ad hoc networks. As one of the basic transportation facilities in an …
A privacy-preserving and untraceable group data sharing scheme in cloud computing
J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …
Quantum-safe round-optimal password authentication for mobile devices
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …