Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …
(VANETs). Today car manufacturers have already started to equip vehicles with …
A survey of key management for secure group communication
S Rafaeli, D Hutchison - ACM Computing Surveys (CSUR), 2003 - dl.acm.org
Group communication can benefit from IP multicast to achieve scalable exchange of
messages. However, there is a challenge of effectively controlling access to the transmitted …
messages. However, there is a challenge of effectively controlling access to the transmitted …
Cyber security in the smart grid: Survey and challenges
The Smart Grid, generally referred to as the next-generation power system, is considered as
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
a revolutionary and evolutionary regime of existing power grids. More importantly, with the …
A survey on the communication architectures in smart grid
The next-generation electric power systems (smart grid) are studied intensively as a
promising solution for energy crisis. One important feature of the smart grid is the integration …
promising solution for energy crisis. One important feature of the smart grid is the integration …
[SÁCH][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
Broadcast encryption
We introduce new theoretical measures for the qualitative and quantitative assessment of
encryption schemes designed for broadcast transmissions. The goal is to allow a central …
encryption schemes designed for broadcast transmissions. The goal is to allow a central …
Packet leashes: a defense against wormhole attacks in wireless networks
As mobile ad hoc network applications are deployed, security emerges as a central
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …
requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc …
Collusion resistant broadcast encryption with short ciphertexts and private keys
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both …
systems are fully secure against any number of colluders. In our first construction both …
Revocation and tracing schemes for stateless receivers
We deal with the problem of a center sending a message to a group of users such that some
subset of the users is considered revoked and should not be able to obtain the content of the …
subset of the users is considered revoked and should not be able to obtain the content of the …
TESLA broadcast authentication
A Perrig, JD Tygar, A Perrig, JD Tygar - Secure Broadcast Communication …, 2003 - Springer
How can we authenticate broadcast messages? This chapter begins to answer our central
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …
question. We introduce TESLA, short for Timed Efficient Stream Loss-tolerant Authentication …