Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A performance evaluation of local descriptors
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …
Password-based authenticated key exchange in the three-party setting
Password-based authenticated key exchange are protocols which are designed to be
secure even when the secret key or password shared between two users is drawn from a …
secure even when the secret key or password shared between two users is drawn from a …
[SÁCH][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
Efficient algorithms for pairing-based cryptosystems
We describe fast new algorithms to implement recent cryptosystems based on the Tate
pairing. In particular, our techniques improve pairing evaluation speed by a factor of about …
pairing. In particular, our techniques improve pairing evaluation speed by a factor of about …
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease
vulnerability of passwords to brute-force dictionary attacks, many organizations enforce …
vulnerability of passwords to brute-force dictionary attacks, many organizations enforce …
Authenticating pervasive devices with human protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive
computing devices. These devices lack the computational, storage, power, and …
computing devices. These devices lack the computational, storage, power, and …
Mobile device assisted secure computer network communication
B Zhu, M Feng, X Yin, Y Yang, Y Zhang… - US Patent …, 2012 - Google Patents
7 299 503 B2* 11/2007 Ballard ““““““““““““““726/29 Ware and the secure Web site being
accessed, such that it is 7,363,500 B2* 4/2008 Funk,,,,,, n,, 713/180 unique to both. In this …
accessed, such that it is 7,363,500 B2* 4/2008 Funk,,,,,, n,, 713/180 unique to both. In this …
Quantum-safe round-optimal password authentication for mobile devices
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
Simple password-based encrypted key exchange protocols
Password-based encrypted key exchange are protocols that are designed to provide pair of
users communicating over an unreliable channel with a secure session key even when the …
users communicating over an unreliable channel with a secure session key even when the …
[HTML][HTML] Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storage
In recent years, the rapid and wide-ranging implementation of a cloud-based electronic
healthcare record (EHR) storage system has shown significant advantages in effectively …
healthcare record (EHR) storage system has shown significant advantages in effectively …