Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
A secure blockchain-based e-health records storage and sharing scheme
Due to the expeditious evolution of wearable technology and wireless mobile networks, the
tele-medicine and mobile medications have turned up into the Telecare Medicine …
tele-medicine and mobile medications have turned up into the Telecare Medicine …
A robust and anonymous patient monitoring system using wireless medical sensor networks
In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient
body to sense the sensitive information of a patient which later on can be transmitted to the …
body to sense the sensitive information of a patient which later on can be transmitted to the …
Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things
Technological development expands the computation process of smart devices that adopt
the telecare medical information system (TMIS) to fulfill the demands of the healthcare …
the telecare medical information system (TMIS) to fulfill the demands of the healthcare …
A survey of authentication schemes in telecare medicine information systems
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …
information of the users are stored at a remote server (Telecare Medical Information System) …
A lightweight user authentication scheme for cloud-IoT based healthcare services
With the ongoing revolution of cloud computing and Internet of Things, remote patient
monitoring has become feasible. These networking paradigms are widely used to provide …
monitoring has become feasible. These networking paradigms are widely used to provide …
A secure three factor based authentication scheme for health care systems using IoT enabled devices
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
Wireless sensor networks (WSNs) can be deployed in any unattended environment. With
new enhancements in internet of things (IoT) technology, authorized users are able to …
new enhancements in internet of things (IoT) technology, authorized users are able to …
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
Multi-factor user authentication scheme for IoT-based healthcare services
Due to the tremendous rise of the cloud computing and the Internet of Things (IoT)
paradigms, the possibility of remote monitoring of the patients in real time by a remote …
paradigms, the possibility of remote monitoring of the patients in real time by a remote …