Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Energy-efficient routing protocols for wireless sensor networks: Architectures, strategies, and performance
Recent developments in low-power communication and signal processing technologies
have led to the extensive implementation of wireless sensor networks (WSNs). In a WSN …
have led to the extensive implementation of wireless sensor networks (WSNs). In a WSN …
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
Abstract The Internet of Things (IoT) is composed of different networked objects (ie, smart
devices) which are interconnected to gather, process, refine, and exchange meaningful data …
devices) which are interconnected to gather, process, refine, and exchange meaningful data …
Efficient blockchain-assisted distributed identity-based signature scheme for integrating consumer electronics in metaverse
R Li, Z Wang, L Fang, C Peng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The metaverse has dramatically transformed the traditional online realm and garnered
significant interest from researchers and industry experts. By integrating with consumer …
significant interest from researchers and industry experts. By integrating with consumer …
CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles
J Li, Y Ji, KKR Choo, D Hogrefe - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The conditional privacy-preserving authentication (CPPA) protocol has applications in the
construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy …
construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy …
SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation
In order to evaluate network trust, different intrusion detection methods have been proposed.
However, it is difficult for a single detection node to collect massive data and perform …
However, it is difficult for a single detection node to collect massive data and perform …
Reportcoin: A novel blockchain-based incentive anonymous reporting system
With the widespread popularity of Internet-enabled devices, mobile users can request and
receive messages anytime and anywhere, which facilitates information feedback for smart …
receive messages anytime and anywhere, which facilitates information feedback for smart …
Fully distributed identity-based threshold signatures with identifiable aborts
Identity-based threshold signature (IDTS) is a forceful primitive to protect identity and data
privacy, in which parties can collaboratively sign a given message as a signer without …
privacy, in which parties can collaboratively sign a given message as a signer without …
Efficient obfuscation for encrypted identity-based signatures in wireless body area networks
The rapid development of the Internet of Things has contributed to the emergence of novel
applications in recent years, such as wireless body area networks (WBANs). The latter can …
applications in recent years, such as wireless body area networks (WBANs). The latter can …
[PDF][PDF] A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System.
Unmanned aerial vehicles (UAVs) have recently attracted widespread attention in civil and
commercial applications. For example, UAVs (or drone) technology is increasingly used in …
commercial applications. For example, UAVs (or drone) technology is increasingly used in …
Multi-party co-signature scheme based on SM2
L Tan, X Shang, L Zou, H Yang, Y Wen, Z Liu - Plos One, 2023 - journals.plos.org
Two-party collaborative signature scheme is an important cryptographic technology for user
authentication and data integrity protection when using mobile devices for financial and …
authentication and data integrity protection when using mobile devices for financial and …