Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Designing secure PUF-based authentication protocols for constrained environments
Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic
authentication and key-agreement protocols due to their unique physical properties. This …
authentication and key-agreement protocols due to their unique physical properties. This …
D2D-MAP: A drone to drone authentication protocol using physical unclonable functions
With the continuous miniaturization of electronic devices and the recent advancements in
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …
wireless communication technologies, Unmanned Aerial Vehicles (UAVs), in general, and …
Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT
The Internet of Things (IoT) facilitates the information exchange between people and smart
devices. It needs cryptographic measures to secure its communications and interconnected …
devices. It needs cryptographic measures to secure its communications and interconnected …
Securing Synchrophasors Using Data Provenance in the Quantum Era
Trust in the fidelity of synchrophasor measurements is crucial for the correct operation of
modern power grids. While most of the existing research on data provenance focuses on the …
modern power grids. While most of the existing research on data provenance focuses on the …
Group Secret Key Generation Using Physical Layer Security for UAV Swarm Communications
In unmanned aerial vehicle (UAV) swarm networks, a group secret key (GSK) is required to
enable secured UAV–UAV communications, multicast, and broadcast transmission …
enable secured UAV–UAV communications, multicast, and broadcast transmission …
On security best practices, systematic analysis of security advice, and internet of things devices
C Bellman - 2022 - repository.library.carleton.ca
Abstract While Internet of Things (IoT) security best practices have recently attracted
considerable attention from industry and governments, academic research has highlighted …
considerable attention from industry and governments, academic research has highlighted …
Development of a 2–4 Double Arbiter PUF Design on FPGA with Enhanced Performance
Implementation of delay-based Physical Unclonable Functions (PUFs) on FPGAs poses
significant challenges due to high requirements, such as the generation of unique and …
significant challenges due to high requirements, such as the generation of unique and …
[PDF][PDF] A Survey on Edge Computing (Ec) Security Challenges: Classification, Threats, and Mitigation Strategies
AM Sheikh, MR Islam, MH Habaebi, SA Zabidi… - 2025 - preprints.org
Edge computing (EC) is a distributed computing approach to processing data at the network
edge, either by the device or a local server, instead of centralized data centers or the cloud …
edge, either by the device or a local server, instead of centralized data centers or the cloud …
Security of Connected Devices: Challenges and Solutions
Connected devices have become increasingly prevalent in the daily lives of human users,
forming the basis of smart spaces designed to provide valuable services, such as remote …
forming the basis of smart spaces designed to provide valuable services, such as remote …
[PDF][PDF] An Improved PUF-Based Privacy-Preserving IoT Protocol for Cloud Storage
The IoT technology allows many types of personal data to be measured by many kinds of
devices and sensors, and to be sent over the Internet for various applications. However, this …
devices and sensors, and to be sent over the Internet for various applications. However, this …