Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
Privacy-preserving schemes for ad hoc social networks: A survey
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of
electricity generation by providing the capability to monitor the consumption behavior of …
electricity generation by providing the capability to monitor the consumption behavior of …
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
With the widespread popularity and usage of Internet-enabled devices, Internet of things has
become one of the most popular techniques of the modern era. However, data generated …
become one of the most popular techniques of the modern era. However, data generated …
A robust and anonymous patient monitoring system using wireless medical sensor networks
In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient
body to sense the sensitive information of a patient which later on can be transmitted to the …
body to sense the sensitive information of a patient which later on can be transmitted to the …
A lightweight user authentication scheme for cloud-IoT based healthcare services
With the ongoing revolution of cloud computing and Internet of Things, remote patient
monitoring has become feasible. These networking paradigms are widely used to provide …
monitoring has become feasible. These networking paradigms are widely used to provide …
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …
other and generate a session key for the subsequent communications. With the rapid …
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …
communication via unfavorable and insecure communication system. The authenticated …
An improved and provably secure privacy preserving authentication protocol for SIP
Abstract Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any
multimedia based application or IP-based telephony service that requires signaling. SIP …
multimedia based application or IP-based telephony service that requires signaling. SIP …
An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography
In the last few years, numerous remote user authentication and session key agreement
schemes have been put forwarded for Telecare Medical Information System, where the …
schemes have been put forwarded for Telecare Medical Information System, where the …