Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Private set intersection for unequal set sizes with mobile applications
Private set intersection (PSI) is a cryptographic technique that is applicable to many privacy-
sensitive scenarios. For decades, researchers have been focusing on improving its …
sensitive scenarios. For decades, researchers have been focusing on improving its …
How to end password reuse on the web
We present a framework by which websites can coordinate to make it difficult for users to set
similar passwords at these websites, in an effort to break the culture of password reuse on …
similar passwords at these websites, in an effort to break the culture of password reuse on …
The circle game: Scalable private membership test using trusted hardware
Malware checking is changing from being a local service to a cloud-assisted one where
users' devices query a cloud server, which hosts a dictionary of malware signatures, to …
users' devices query a cloud server, which hosts a dictionary of malware signatures, to …
Detecting stuffing of a {User's} credentials at her own accounts
We propose a framework by which websites can coordinate to detect credential stuffing on
individual user accounts. Our detection algorithm teases apart normal login behavior …
individual user accounts. Our detection algorithm teases apart normal login behavior …
PPSB: An open and flexible platform for privacy-preserving safe browsing
Safe Browsing (SB) is an important security feature in modern web browsers to help detect
new unsafe websites. Although useful, recent studies have pointed out that the widely …
new unsafe websites. Although useful, recent studies have pointed out that the widely …
[HTML][HTML] Private membership test protocol with low communication complexity
S Ramezanian, T Meskanen, M Naderpour… - Digital Communications …, 2020 - Elsevier
We introduce a practical method to perform private membership tests. In this method, clients
are able to test whether an item is in a set controlled by the server without revealing their …
are able to test whether an item is in a set controlled by the server without revealing their …
Real-time private membership test using homomorphic encryption
With the ever increasing volume of private data residing on the cloud, privacy is becoming a
major concern. Often times, sensitive information is leaked during a querying process …
major concern. Often times, sensitive information is leaked during a querying process …
Parental control with edge computing and 5g networks
S Ramezanian, T Meskanen… - 2021 29th Conference of …, 2021 - ieeexplore.ieee.org
Parental control methods are a popular tool to keep children safe in the digital world.
Usually, digital parental control methods function by disclosing the entire log of child's on …
Usually, digital parental control methods function by disclosing the entire log of child's on …
Privacy preserving shortest path queries on directed graph
S Ramezanian, T Meskanen… - 2018 22nd Conference of …, 2018 - ieeexplore.ieee.org
Trust relation in this work refers to permission that is given to a user at source-host to access
another user at target-host through an authentication key with a unique fingerprint. We form …
another user at target-host through an authentication key with a unique fingerprint. We form …
Privacy preservation in outsourced mobility traces through compact data structures
Indoor localization is widely used as enabling technology for location-based services, such
as advertising, indoor routing, and behavioral analysis. To keep these features available …
as advertising, indoor routing, and behavioral analysis. To keep these features available …