nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A full lifecycle privacy protection scheme for sensitive data in cloud computing
|
Xiong, Jinbo |
|
2014 |
8 |
6 |
p. 1025-1037 |
artikel |
2 |
A lightweight identity authentication method by exploiting network covert channel
|
Xie, Haijiang |
|
2014 |
8 |
6 |
p. 1038-1047 |
artikel |
3 |
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system
|
Yang, Haomiao |
|
2014 |
8 |
6 |
p. 1059-1069 |
artikel |
4 |
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
|
Jiang, Qi |
|
2014 |
8 |
6 |
p. 1070-1081 |
artikel |
5 |
A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology
|
Jafarabadi, Ahmad |
|
2014 |
8 |
6 |
p. 1008-1022 |
artikel |
6 |
A topological potential weighted community-based recommendation trust model for P2P networks
|
Han, Qiyi |
|
2014 |
8 |
6 |
p. 1048-1058 |
artikel |
7 |
EAPA: An efficient authentication protocol against pollution attack for smart grid
|
Wen, Mi |
|
2014 |
8 |
6 |
p. 1082-1089 |
artikel |
8 |
Fault-aware flow control and multi-path routing in VANETs
|
Zhang, Xiaomei |
|
2014 |
8 |
6 |
p. 1090-1107 |
artikel |
9 |
Guest editorial: Security and privacy of P2P networks in emerging smart city
|
Li, Hongwei |
|
2015 |
8 |
6 |
p. 1023-1024 |
artikel |
10 |
Mix-zones optimal deployment for protecting location privacy in VANET
|
Sun, Yipin |
|
2014 |
8 |
6 |
p. 1108-1121 |
artikel |
11 |
On storage partitioning of internet routing tables: A P2P-based enhancement for scalable routers
|
Chen, Wenlong |
|
2014 |
8 |
6 |
p. 952-964 |
artikel |
12 |
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications
|
Chen, Le |
|
2014 |
8 |
6 |
p. 1122-1132 |
artikel |
13 |
Relay selection for peer-to-peer cooperative OFDMA with channel distribution uncertainty
|
Li, Hua |
|
2014 |
8 |
6 |
p. 925-937 |
artikel |
14 |
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement
|
Wu, Jun |
|
2014 |
8 |
6 |
p. 1133-1142 |
artikel |
15 |
Task allocation in volunteer computing networks under monetary budget constraints
|
Guler, Huseyin |
|
2014 |
8 |
6 |
p. 938-951 |
artikel |
16 |
Understanding the performance of offline download in real p2p networks
|
Yang, Zhi |
|
2014 |
8 |
6 |
p. 992-1007 |
artikel |
17 |
VITAL: Structured and clustered super-peer network for similarity search
|
Ghanem, Sahar M. |
|
2014 |
8 |
6 |
p. 965-991 |
artikel |