Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Barriers and facilitators that influence telemedicine-based, real-time, online consultation at patients' homes: systematic literature review
HKY Almathami, KT Win… - Journal of medical Internet …, 2020 - jmir.org
Background Health care providers are adopting information and communication
technologies (ICTs) to enhance their services. Telemedicine is one of the services that rely …
technologies (ICTs) to enhance their services. Telemedicine is one of the services that rely …
[HTML][HTML] Uniting cyber security and machine learning: Advantages, challenges and future research
Abstract Machine learning (ML) is a subset of Artificial Intelligence (AI), which focuses on the
implementation of some systems that can learn from the historical data, identify patterns and …
implementation of some systems that can learn from the historical data, identify patterns and …
A survey on key agreement and authentication protocol for internet of things application
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …
network communication technology to establish ubiquitous connectivity among people …
Design of secure mutual authentication scheme for metaverse environments using blockchain
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …
education and meetings has increased. However, since the conventional online …
Design of blockchain-based lightweight V2I handover authentication protocol for VANET
Connected vehicle means providing different services, such as advanced driver-assistance
systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks …
systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks …
Secure and lightweight user authentication scheme for cloud-assisted Internet of Things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks
Precision farming has a positive potential in the agricultural industry regarding water
conservation, increased productivity, better development of rural areas, and increased …
conservation, increased productivity, better development of rural areas, and increased …
Designing blockchain-based access control protocol in IoT-enabled smart-grid system
We design a new blockchain-based access control protocol in IoT-enabled smart-grid
system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely …
system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely …
TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
A robust privacy-preserving ecc-based three-factor authentication scheme for metaverse environment
Metaverse is revolutionizing the future iteration of technology with the potential to ameliorate
efficiency and innovation drastically. It fashions engaging spaces for user interaction that …
efficiency and innovation drastically. It fashions engaging spaces for user interaction that …