Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security of internet of things based on cryptographic algorithms: a survey
SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
Abstract Internet of Things (IoT) is a new concept in Information and Communications
Technology and its structure is based on smart objects communications. It contributes to …
Technology and its structure is based on smart objects communications. It contributes to …
Elliptic curve lightweight cryptography: A survey
CA Lara-Nino, A Diaz-Perez… - Ieee …, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …
industry and academy from different perspectives. Some of these aspects include …
Analysis of lightweight encryption scheme for fog-to-things communication
The growing concerns in cybersecurity is preventing unknowns which evolve from time to
time. Internet of Things (IoT) is one of the emerging fields that have been applied for smart …
time. Internet of Things (IoT) is one of the emerging fields that have been applied for smart …
[HTML][HTML] A multi-tier MQTT architecture with multiple brokers based on fog computing for securing industrial IoT
H Kurdi, V Thayananthan - Applied Sciences, 2022 - mdpi.com
With the rapid growth of internet-connected devices and their resource-constrained
capabilities, the current authentication mechanisms are unable to meet the complex IoT …
capabilities, the current authentication mechanisms are unable to meet the complex IoT …
Differential flow space allocation scheme in SDN based fog computing for IoT applications
Technological advancements in wireless communications and electronics have enabled the
rapid evolution of smart things connected to the Internet. Traditional networks face the …
rapid evolution of smart things connected to the Internet. Traditional networks face the …
[PDF][PDF] Developed security and privacy algorithms for cyber physical system
DD Khudhur, MS Croock - International Journal of Electrical and …, 2021 - academia.edu
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates
with wireless sensor network (WSN). This system is widely used in many applications such …
with wireless sensor network (WSN). This system is widely used in many applications such …
Collaborative intrusion detection schemes in fog-to-things computing
The adoption of the Internet of Things (IoT) has raised a significant concern of cyber-attacks
at the edge of the network. As the existing traditional intrusion detection (IDS) solutions …
at the edge of the network. As the existing traditional intrusion detection (IDS) solutions …
An effective block-chain based authentication technique for cloud based IoT
Nowadays, cloud computing services and applications have created plenty of storage space
to meet the demand and the utility for human life. However, these cloud services face …
to meet the demand and the utility for human life. However, these cloud services face …
Lightweight privacy-preserving equality query in edge computing
Q Wu, F Zhou, J Xu, D Feng, B Li - IEEE Access, 2019 - ieeexplore.ieee.org
As edge computing attains tremendous popularity, IoT devices always outsource their data
to nearby edge servers for storing and pre-processing, which improves the efficiency of data …
to nearby edge servers for storing and pre-processing, which improves the efficiency of data …
Scalable identity and key management for publish-subscribe protocols in the Internet-of-Things
Publish-Subscribe protocols such as the Message Queuing Telemetry Transport (MQTT)
protocol are considered scalable, lightweight, and one-size-fits-all solutions for the Internet …
protocol are considered scalable, lightweight, and one-size-fits-all solutions for the Internet …