Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on the state-of-the-art privacy-preserving approaches in the e-health clouds
A Abbas, SU Khan - IEEE journal of Biomedical and health …, 2014 - ieeexplore.ieee.org
Cloud computing is emerging as a new computing paradigm in the healthcare sector
besides other business domains. Large numbers of health organizations have started …
besides other business domains. Large numbers of health organizations have started …
Post-quantum asynchronous deniable key exchange and the signal handshake
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
An efficient authentication scheme for intra-vehicular controller area network
Communication in modern cars is managed by a controller area network (CAN) bus protocol
and its extensions for electronic control units (ECUs). The CAN bus is a preferred method for …
and its extensions for electronic control units (ECUs). The CAN bus is a preferred method for …
The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks
Multiparty signature protocols need protection against rogue-key attacks, made possible
whenever an adversary can choose its public key (s) arbitrarily. For many schemes …
whenever an adversary can choose its public key (s) arbitrarily. For many schemes …
[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture
F Tang, C Ma, K Cheng - Digital Communications and Networks, 2024 - Elsevier
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …
which contains identity authentication, access control, dynamic evaluation, and so on. This …
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map
Abstract The concept of Designated Verifier Signatures (DVS) was introduced by Jakobsson,
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …
Image recognition with deep learning
Image recognition is one of the most important fields of image processing and computer
vision. Food image classification is an unique branch of image recognition problem. In …
vision. Food image classification is an unique branch of image recognition problem. In …
Designated verifier signature schemes: Attacks, new security notions and a new construction
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Chameleon hashing without key exposure
Chameleon signatures are based on well established hash-and-sign paradigm, where a
chameleon hash function is used to compute the cryptographic message digest. Chameleon …
chameleon hash function is used to compute the cryptographic message digest. Chameleon …
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
Abstract Universal Designated-Verifier Signature (UDVS) schemes are digital signature
schemes with additional functionality which allows any holder of a signature to designate the …
schemes with additional functionality which allows any holder of a signature to designate the …