Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Blockchain technology for supply chain management: A comprehensive review
Firms are eager to adopt new technologies, such as Artificial Intelligence (AI), Cloud
Computing, Big Data, etc., as they witness successful business applications. As one of the …
Computing, Big Data, etc., as they witness successful business applications. As one of the …
Authenticated Diffe-Hellman key agreement protocols
S Blake-Wilson, A Menezes - International Workshop on Selected Areas in …, 1998 - Springer
This paper surveys recent work on the design and analysis of key agreement protocols that
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
are based on the intractability of the Diffe-Hellman problem. The focus is on protocols that …
[HTML][HTML] Secure and energy-efficient framework using Internet of Medical Things for e-healthcare
In various fields, the internet of things (IoT) gains a lot of popularity due to its autonomous
sensors operations with the least cost. In medical and healthcare applications, the IoT …
sensors operations with the least cost. In medical and healthcare applications, the IoT …
[Књига][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[Књига][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Practical techniques for searches on encrypted data
It is desirable to store data on data storage servers such as mail servers and file servers in
encrypted form to reduce security and privacy risks. But this usually implies that one has to …
encrypted form to reduce security and privacy risks. But this usually implies that one has to …
[Књига][B] Foundations of cryptography: volume 2, basic applications
O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …
computing systems that address security concerns. The design of cryptographic systems …
[Књига][B] Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to kee** information safe, in an era when the …
cryptography experts. Cryptography is vital to kee** information safe, in an era when the …
Entity authentication and key distribution
We provide the first formal treatment of entity authentication and authenticated key
distribution appropriate to the distributed environment. Addressed in detail are the problems …
distribution appropriate to the distributed environment. Addressed in detail are the problems …
Keying hash functions for message authentication
The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has
become a standard approach in many applications, particularly Internet security protocols …
become a standard approach in many applications, particularly Internet security protocols …