Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security and privacy issues in smart cities/industries: technologies, applications, and challenges
PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …
lives. Advanced information and communication technologies play a vital role in the …
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
Secure ECC-based three-factor mutual authentication protocol for telecare medical information system
In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting
attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and …
attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and …
A secure and lightweight authentication protocol for IoT-based smart homes
With the information and communication technologies (ICT) and Internet of Things (IoT)
gradually advancing, smart homes have been able to provide home services to users. The …
gradually advancing, smart homes have been able to provide home services to users. The …
Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain
Telecare medical information system (TMIS) implemented in wireless body area network
(WBAN) is convenient and time-saving for patients and doctors. TMIS is realized using …
(WBAN) is convenient and time-saving for patients and doctors. TMIS is realized using …
[HTML][HTML] A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats …
The Internet of Things (IoT) has experienced constant growth in the number of devices
deployed and the range of applications in which such devices are used. They vary widely in …
deployed and the range of applications in which such devices are used. They vary widely in …
[HTML][HTML] Design of secure protocol for cloud-assisted electronic health record system using blockchain
In the traditional electronic health record (EHR) management system, each medical service
center manages their own health records, respectively, which are difficult to share on the …
center manages their own health records, respectively, which are difficult to share on the …
IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment
With the emergence of the concept of smart city and the increasing demands for a range of
vehicles, Internet of Vehicles (IoV) has achieved a lot of attention by providing multiple …
vehicles, Internet of Vehicles (IoV) has achieved a lot of attention by providing multiple …
Secure and efficient honey list-based authentication protocol for vehicular ad hoc networks
Vehicular Ad Hoc Network (VANET) and Internet of Vehicle (IoV) technologies are
particularly attracting attention from industrial communities because of the intelligent …
particularly attracting attention from industrial communities because of the intelligent …
WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks
Wireless sensor networks (WSN) are widely used to provide users with convenient services
such as health-care, and smart home. To provide convenient services, sensor nodes in WSN …
such as health-care, and smart home. To provide convenient services, sensor nodes in WSN …