Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Designing blockchain-based access control protocol in IoT-enabled smart-grid system
We design a new blockchain-based access control protocol in IoT-enabled smart-grid
system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely …
system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely …
A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …
progressive development of the Internet of Things (IoT) has motivated medical and health …
Secure signature-based authenticated key establishment scheme for future IoT applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …
These devices can be remotely accessed and controlled using existing network …
Design of secure user authenticated key management protocol for generic IoT networks
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …
applications including smart home, smart city, smart grid, industrial Internet, connected …
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …
the academy and industry because it has several potential applications ranging from the …
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …