Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Understanding security requirements and challenges in Internet of Things (IoT): A review
Internet of things (IoT) is realized by the idea of free flow of information amongst various low‐
power embedded devices that use the Internet to communicate with one another. It is …
power embedded devices that use the Internet to communicate with one another. It is …
The role of the adversary model in applied security research
Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …
schemes or protocols. However, their use in other computer science research disciplines is …
Survey on secure communication protocols for the Internet of Things
KT Nguyen, M Laurent, N Oualha - Ad Hoc Networks, 2015 - Elsevier
Abstract The Internet of Things or “IoT” defines a highly interconnected network of
heterogeneous devices where all kinds of communications seem to be possible, even …
heterogeneous devices where all kinds of communications seem to be possible, even …
Aggregated-proof based hierarchical authentication scheme for the internet of things
The Internet of Things (IoT) is becoming an attractive system paradigm to realize
interconnections through the physical, cyber, and social spaces. During the interactions …
interconnections through the physical, cyber, and social spaces. During the interactions …
A survey of key bootstrap** protocols based on public key cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks
R Montero-Canela, E Zambrano-Serrano… - Ad Hoc Networks, 2020 - Elsevier
Ad Hoc networks are considered essential elements of the Internet of Things (IoT), which is a
technological trend for innovative future applications. Since in IoT systems the devices are …
technological trend for innovative future applications. Since in IoT systems the devices are …
Security and privacy issues in smart healthcare system using internet of things
The rapid advancement in Internet of Things (IoT) associated with biosensors provides many
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …
benefits to the humans, such as smart healthcare systems (SHS). SHS offer plenty of …
Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
Abstract The Internet of Things (IoT) is an emerging and promising paradigm that can be
considered as an extension of the Internet to interconnect all kinds of smart objects around …
considered as an extension of the Internet to interconnect all kinds of smart objects around …
A lightweight IoT security protocol
MT Hammi, E Livolant, P Bellot… - 2017 1st cyber …, 2017 - ieeexplore.ieee.org
The IoT is a technology that enables the inter-connection of smart physical and virtual
objects and provides advanced services. Objects or things are generally constrained …
objects and provides advanced services. Objects or things are generally constrained …
LC-DEX: lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based internet of …
The high level of security requirements and low capabilities of constrained devices that are
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …