Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             38 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturation Zhu, Qidan

527 C p. 191-209
artikel
2 An efficient approach for secure multi-party computation without authenticated channel Vu, Duy-Hien

527 C p. 356-368
artikel
3 An endorsement-based trust bootstrapping approach for newcomer cloud services Wahab, Omar Abdel

527 C p. 159-175
artikel
4 An insurance theory based optimal cyber-insurance contract against moral hazard Dou, Wanchun

527 C p. 576-589
artikel
5 APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks Ma, Yuxiang

527 C p. 511-532
artikel
6 A privacy-preserving cryptosystem for IoT E-healthcare Hamza, Rafik

527 C p. 493-510
artikel
7 A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS Salem, Fatty M.

527 C p. 382-393
artikel
8 APS: Attribute-aware privacy-preserving scheme in location-based services Li, Weihao

527 C p. 460-476
artikel
9 A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services Zhang, Shaobo

527 C p. 406-419
artikel
10 Blockchain-based system for secure outsourcing of bilinear pairings Lin, Chao

527 C p. 590-601
artikel
11 Building a dynamic searchable encrypted medical database for multi-client Xu, Lei

527 C p. 394-405
artikel
12 CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud Hua, Jiafeng

527 C p. 560-575
artikel
13 Cloud-assisted privacy-conscious large-scale Markowitz portfolio Zhang, Yushu

527 C p. 548-559
artikel
14 Cloud-based lightweight secure RFID mutual authentication protocol in IoT Fan, Kai

527 C p. 329-340
artikel
15 Cross-language question retrieval with multi-layer representation and layer-wise adversary Li, Bo

527 C p. 241-252
artikel
16 Editorial Board
527 C p. ii
artikel
17 Effective privacy preserving data publishing by vectorization Eom, Chris Soo-Hyun

527 C p. 311-328
artikel
18 Efficient algorithms based on centrality measures for identification of top-K influential users in social networks Alshahrani, Mohammed

527 C p. 88-107
artikel
19 Efficient privacy preservation of big data for accurate data mining Chamikara, M.A.P.

527 C p. 420-443
artikel
20 Event-triggered control for stochastic networked control systems against Denial-of-Service attacks Guo, Li

527 C p. 51-69
artikel
21 Exploiting location-related behaviors without the GPS data on smartphones Li, Fenghua

527 C p. 444-459
artikel
22 Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environments Bera, Sukhendu

527 C p. 128-158
artikel
23 General interval-valued overlap functions and interval-valued overlap indices Asmus, Tiago da Cruz

527 C p. 27-50
artikel
24 Hierarchical clustering supported by reciprocal nearest neighbors Xie, Wen-Bo

527 C p. 279-292
artikel
25 Improving artificial Bee colony algorithm using a new neighborhood selection mechanism Wang, Hui

527 C p. 227-240
artikel
26 Incentive mechanism for cooperative authentication: An evolutionary game approach Fang, Liang

527 C p. 369-381
artikel
27 Pose-guided spatiotemporal alignment for video-based person Re-identification Gao, Changxin

527 C p. 176-190
artikel
28 Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing Systems Luo, Guangchun

527 C p. 602-619
artikel
29 Privacy by Evidence: A Methodology to develop privacy-friendly software applications Barbosa, Pedro

527 C p. 294-310
artikel
30 Privacy-enhanced remote data integrity checking with updatable timestamp Wu, Tong

527 C p. 210-226
artikel
31 Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives Feng, Jun

527 C p. 341-355
artikel
32 Privacy-Preserving distributed deep learning based on secret sharing Duan, Jia

527 C p. 108-127
artikel
33 Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing Tang, Wenjuan

527 C p. 477-492
artikel
34 PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT Su, Mang

527 C p. 533-547
artikel
35 Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimization Mu, Lei

527 C p. 253-278
artikel
36 Robust Manhattan non-negative matrix factorization for image recovery and representation Dai, Xiangguang

527 C p. 70-87
artikel
37 Skewed non-Gaussian GARCH models for cryptocurrencies volatility modelling Cerqueti, Roy

527 C p. 1-26
artikel
38 Special Section on Privacy Computing: Principles and Applications Chen, Jinjun

527 C p. 293
artikel
                             38 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland