Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Potential identity resolution systems for the industrial Internet of Things: A survey
In recent years, the Industrial Internet of Things (IIoT) came into being. IIoT connects
sensors, industrial equipment, products, and staff in the factory, enabling context-awareness …
sensors, industrial equipment, products, and staff in the factory, enabling context-awareness …
Thirty years of DNS insecurity: Current issues and perspectives
G Schmid - IEEE Communications Surveys & Tutorials, 2021 - ieeexplore.ieee.org
When DNS was created, nobody expected that it would have become the base for the digital
economy and a prime target for cybercriminals. And nobody expected that one main asset of …
economy and a prime target for cybercriminals. And nobody expected that one main asset of …
SoK: secure messaging
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …
many solutions now claim to offer secure and private messaging. This includes both a large …
Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
Decentralized systems are a subset of distributed systems where multiple authorities control
different components and no authority is fully trusted by all. This implies that any component …
different components and no authority is fully trusted by all. This implies that any component …
Internet Identifiers: A Survey of History, Challenges, and Future Perspectives
Identity systems are fundamental to any network, just as a language is shaped by a
consistent set of symbols and their interpretation. A network is defined by a consistent set of …
consistent set of symbols and their interpretation. A network is defined by a consistent set of …
In encryption we don't trust: The effect of end-to-end encryption to the masses on user perception
S Dechand, A Naiakshina, A Danilova… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
With WhatsApp's adoption of the Signal Protocol as its default, end-to-end encryption by the
masses happened almost overnight. Unlike iMessage, WhatsApp notifies users that …
masses happened almost overnight. Unlike iMessage, WhatsApp notifies users that …
Deniable key exchanges for secure messaging
N Unger, I Goldberg - Proceedings of the 22nd acm sigsac conference …, 2015 - dl.acm.org
In the wake of recent revelations of mass government surveillance, secure messaging
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …
reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption
In this paper we present reclaimID: An architecture that allows users to reclaim their digital
identities by securely sharing identity attributes without the need for a centralised service …
identities by securely sharing identity attributes without the need for a centralised service …
Unravelling ariadne's thread: Exploring the threats of decentralised dns
The current landscape of the core Internet technologies shows considerable centralisation
with the big tech companies controlling the vast majority of traffic and services. This situation …
with the big tech companies controlling the vast majority of traffic and services. This situation …
ZKlaims: Privacy-preserving attribute-based credentials using non-interactive zero-knowledge techniques
In this paper we present ZKlaims: a system that allows users to present attribute-based
credentials in a privacy-preserving way. We achieve a zero-knowledge property on the basis …
credentials in a privacy-preserving way. We achieve a zero-knowledge property on the basis …