Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …
opportunity not only for the development of various home automation systems but also for …
A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities
K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …
Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT
B Jia, X Zhang, J Liu, Y Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With rapid growth in data volume generated from different industrial devices in IoT, the
protection for sensitive and private data in data sharing has become crucial. At present …
protection for sensitive and private data in data sharing has become crucial. At present …
Secure and lightweight user authentication scheme for cloud-assisted Internet of Things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
Privacy-friendly platform for healthcare data in cloud based on blockchain environment
Data in cloud has always been a point of attraction for the cyber attackers. Nowadays
healthcare data in cloud has become their new interest. Attacks on these healthcare data …
healthcare data in cloud has become their new interest. Attacks on these healthcare data …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Cybersecurity of industrial cyber-physical systems: A review
Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the
processes based on the “physics” data gathered by edge sensor networks. Recent …
processes based on the “physics” data gathered by edge sensor networks. Recent …
AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …
transportation that takes intelligent commitments to the passengers to improve traffic safety …
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …