Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain intelligence for internet of vehicles: Challenges and solutions
With the development of communication and networking technologies, the Internet of
Vehicles (IoV) has become the foundation of smart transportation. The development of …
Vehicles (IoV) has become the foundation of smart transportation. The development of …
Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey
The accelerated growth of networking technologies highlights the importance of
Authentication and Access Control (AAC) as protection against associated attacks …
Authentication and Access Control (AAC) as protection against associated attacks …
[HTML][HTML] Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing
S Athanere, R Thakur - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, cloud servers are gathering an increasing amount of data. Data is commonly
stored on cloud servers in the form of ciphertext to protect security and concealment of data …
stored on cloud servers in the form of ciphertext to protect security and concealment of data …
A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing
Ciphertext-policy attribute-based encryption (CP-ABE) has been widely studied and used in
access control schemes for secure data sharing. Since in most of the existing attribute-based …
access control schemes for secure data sharing. Since in most of the existing attribute-based …
A blockchain based access control scheme with hidden policy and attribute
Attribute-based access control, which can provide fine-grained and flexible privacy
protection, is widely used in practice. Traditional attribute-based access control schemes …
protection, is widely used in practice. Traditional attribute-based access control schemes …
[PDF][PDF] Secure distributed cloud storage based on the blockchain technology and smart contracts
S Gousteris, YC Stamatiou… - Emerging Science …, 2023 - pdfs.semanticscholar.org
Objectives: This paper addresses the problem of secure data storage and sharing over
cloud storage infrastructures. A secure, distributed cloud storage structure incorporating the …
cloud storage infrastructures. A secure, distributed cloud storage structure incorporating the …
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
H Wang, J Liang, Y Ding, S Tang, Y Wang - Computer Standards & …, 2023 - Elsevier
Smart Health, with its flexibility and efficiency, has been widely deployed, especially during
the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not …
the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not …
ReLAC: Revocable and lightweight access control with blockchain for smart consumer electronics
The increasing popularity of consumer smart devices has led to concerns about the security
of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data …
of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data …
Secure data access control with fair accountability in smart grid data sharing: An edge blockchain approach
Nowadays, the advance of smart grid technology has fostered the development of
microgrids, which can efficiently control and manage the distributed energy resources …
microgrids, which can efficiently control and manage the distributed energy resources …
Blockchain-assisted transparent cross-domain authorization and authentication for smart city
Secure cross-domain authorization and authentication (AA) enable application service
providers (ASPs) to allow users for resource access from different trusted domains. In this …
providers (ASPs) to allow users for resource access from different trusted domains. In this …