Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] An enhanced two-factor user authentication scheme in wireless sensor networks.
Designing a user authentication protocol for wireless sensor networks is a difficult task
because wireless networks are susceptible to attacks and sensor node has limited energy …
because wireless networks are susceptible to attacks and sensor node has limited energy …
SafeQ: Secure and efficient query processing in sensor networks
The architecture of two-tiered sensor networks, where storage nodes serve as an
intermediate tier between sensors and a sink for storing data and processing queries, has …
intermediate tier between sensors and a sink for storing data and processing queries, has …
Collaborative enforcement of firewall policies in virtual private networks
The widely deployed Virtual Private Network (VPN) technology allows roaming users to
build an encrypted tunnel to a VPN server, which henceforth allows roaming users to access …
build an encrypted tunnel to a VPN server, which henceforth allows roaming users to access …
Verifiable fine-grained top-k queries in tiered sensor networks
Most large-scale sensor networks are expected to follow a two-tier architecture with resource-
poor sensor nodes at the lower tier and resource-rich master nodes at the upper tier. Master …
poor sensor nodes at the lower tier and resource-rich master nodes at the upper tier. Master …
Privacy-preserving search over encrypted personal health record in multi-source cloud
Cloud-based Personal Health Record systems (CB-PHR) have great potential in facilitating
the management of individual health records. Security and privacy concerns are among the …
the management of individual health records. Security and privacy concerns are among the …
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
R Fan, D He, X Pan, L ** - Journal of Zhejiang University SCIENCE C, 2011 - Springer
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment
and resource constraints. Considering that most large-scale WSNs follow a two-tiered …
and resource constraints. Considering that most large-scale WSNs follow a two-tiered …
Top- Query Result Completeness Verification in Tiered Sensor Networks
Storage nodes are expected to be placed as an intermediate tier of large scale sensor
networks for caching the collected sensor readings and responding to queries with benefits …
networks for caching the collected sensor readings and responding to queries with benefits …
A digital watermarking approach to secure and precise range query processing in sensor networks
Two-tiered wireless sensor networks offer good scalability, efficient power usage, and space
saving. However, storage nodes are more attractive to attackers than sensors because they …
saving. However, storage nodes are more attractive to attackers than sensors because they …
Securing top-k query processing in two-tiered sensor networks
X Kui, J Feng, X Zhou, H Du, X Deng, P Zhong… - Connection …, 2021 - Taylor & Francis
Integrity and privacy are two important secure matrices in cyber security. Due to the limited
resources and computing capability of the sensor nodes, it is challenging to simultaneously …
resources and computing capability of the sensor nodes, it is challenging to simultaneously …
Privacy-and integrity-preserving range queries in sensor networks
The architecture of two-tiered sensor networks, where storage nodes serve as an
intermediate tier between sensors and a sink for storing data and processing queries, has …
intermediate tier between sensors and a sink for storing data and processing queries, has …