Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on routing in anonymous communication protocols
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …
communication platform that billions of users rely on for their daily activities. While this …
SoK: secure messaging
Motivated by recent revelations of widespread state surveillance of personal communication,
many solutions now claim to offer secure and private messaging. This includes both a large …
many solutions now claim to offer secure and private messaging. This includes both a large …
DP5: A private presence service
Users of social applications like to be notified when their friends are online. Typically, this is
done by a central server kee** track of who is online and offline, as well as of all of the …
done by a central server kee** track of who is online and offline, as well as of all of the …
Deniable key exchanges for secure messaging
N Unger, I Goldberg - Proceedings of the 22nd acm sigsac conference …, 2015 - dl.acm.org
In the wake of recent revelations of mass government surveillance, secure messaging
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …
protocols have come under renewed scrutiny. A widespread weakness of existing solutions …
A protocol for anonymous short communications in social networks and its application to proximity-based services
Several innovative applications could be advantageously placed within social networks, to
be effective, attractive, and pervasive. Examples of application domains that could benefit …
be effective, attractive, and pervasive. Examples of application domains that could benefit …
Highly distributed and privacy-preserving queries on personal data management systems
Personal data management system (PDMS) solutions are flourishing, boosted by smart
disclosure initiatives and new regulations. PDMSs allow users to easily store and manage …
disclosure initiatives and new regulations. PDMSs allow users to easily store and manage …
CDAG: A serialized blockDAG for permissioned blockchain
Blockchain is maintained as a global log between a network of nodes and uses
cryptographic distributed protocols to synchronize the updates. As adopted by Bitcoin and …
cryptographic distributed protocols to synchronize the updates. As adopted by Bitcoin and …
Privacy-preserving data infrastructure for smart home appliances based on the Octopus DHT
Smart homes are about to become reality, involving technology such as Radio-Frequency
Identification (RFID), which enables querying for extended product information from the …
Identification (RFID), which enables querying for extended product information from the …
The case for distributed data archival using secret splitting with percival
Most encryption used today obfuscates data behind a secret key or a problem believed to be
computationally complex. One can fundamentally think of it as delayed release for a …
computationally complex. One can fundamentally think of it as delayed release for a …
SPA: A secure and private auction framework for decentralized online social networks
The security and privacy threats on e-commerce have attracted intensive attention recently.
The explosive growth of online social networks (OSNs) has made them potential new great …
The explosive growth of online social networks (OSNs) has made them potential new great …