nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive neural network control for time-varying state constrained nonlinear stochastic systems with input saturation
|
Zhu, Qidan |
|
|
527 |
C |
p. 191-209 |
artikel |
2 |
An efficient approach for secure multi-party computation without authenticated channel
|
Vu, Duy-Hien |
|
|
527 |
C |
p. 356-368 |
artikel |
3 |
An endorsement-based trust bootstrapping approach for newcomer cloud services
|
Wahab, Omar Abdel |
|
|
527 |
C |
p. 159-175 |
artikel |
4 |
An insurance theory based optimal cyber-insurance contract against moral hazard
|
Dou, Wanchun |
|
|
527 |
C |
p. 576-589 |
artikel |
5 |
APCN: A scalable architecture for balancing accountability and privacy in large-scale content-based networks
|
Ma, Yuxiang |
|
|
527 |
C |
p. 511-532 |
artikel |
6 |
A privacy-preserving cryptosystem for IoT E-healthcare
|
Hamza, Rafik |
|
|
527 |
C |
p. 493-510 |
artikel |
7 |
A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS
|
Salem, Fatty M. |
|
|
527 |
C |
p. 382-393 |
artikel |
8 |
APS: Attribute-aware privacy-preserving scheme in location-based services
|
Li, Weihao |
|
|
527 |
C |
p. 460-476 |
artikel |
9 |
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services
|
Zhang, Shaobo |
|
|
527 |
C |
p. 406-419 |
artikel |
10 |
Blockchain-based system for secure outsourcing of bilinear pairings
|
Lin, Chao |
|
|
527 |
C |
p. 590-601 |
artikel |
11 |
Building a dynamic searchable encrypted medical database for multi-client
|
Xu, Lei |
|
|
527 |
C |
p. 394-405 |
artikel |
12 |
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud
|
Hua, Jiafeng |
|
|
527 |
C |
p. 560-575 |
artikel |
13 |
Cloud-assisted privacy-conscious large-scale Markowitz portfolio
|
Zhang, Yushu |
|
|
527 |
C |
p. 548-559 |
artikel |
14 |
Cloud-based lightweight secure RFID mutual authentication protocol in IoT
|
Fan, Kai |
|
|
527 |
C |
p. 329-340 |
artikel |
15 |
Cross-language question retrieval with multi-layer representation and layer-wise adversary
|
Li, Bo |
|
|
527 |
C |
p. 241-252 |
artikel |
16 |
Editorial Board
|
|
|
|
527 |
C |
p. ii |
artikel |
17 |
Effective privacy preserving data publishing by vectorization
|
Eom, Chris Soo-Hyun |
|
|
527 |
C |
p. 311-328 |
artikel |
18 |
Efficient algorithms based on centrality measures for identification of top-K influential users in social networks
|
Alshahrani, Mohammed |
|
|
527 |
C |
p. 88-107 |
artikel |
19 |
Efficient privacy preservation of big data for accurate data mining
|
Chamikara, M.A.P. |
|
|
527 |
C |
p. 420-443 |
artikel |
20 |
Event-triggered control for stochastic networked control systems against Denial-of-Service attacks
|
Guo, Li |
|
|
527 |
C |
p. 51-69 |
artikel |
21 |
Exploiting location-related behaviors without the GPS data on smartphones
|
Li, Fenghua |
|
|
527 |
C |
p. 444-459 |
artikel |
22 |
Fixed charge 4D-TP for a breakable item under hybrid random type-2 uncertain environments
|
Bera, Sukhendu |
|
|
527 |
C |
p. 128-158 |
artikel |
23 |
General interval-valued overlap functions and interval-valued overlap indices
|
Asmus, Tiago da Cruz |
|
|
527 |
C |
p. 27-50 |
artikel |
24 |
Hierarchical clustering supported by reciprocal nearest neighbors
|
Xie, Wen-Bo |
|
|
527 |
C |
p. 279-292 |
artikel |
25 |
Improving artificial Bee colony algorithm using a new neighborhood selection mechanism
|
Wang, Hui |
|
|
527 |
C |
p. 227-240 |
artikel |
26 |
Incentive mechanism for cooperative authentication: An evolutionary game approach
|
Fang, Liang |
|
|
527 |
C |
p. 369-381 |
artikel |
27 |
Pose-guided spatiotemporal alignment for video-based person Re-identification
|
Gao, Changxin |
|
|
527 |
C |
p. 176-190 |
artikel |
28 |
Preserving adjustable path privacy for task acquisition in Mobile Crowdsensing Systems
|
Luo, Guangchun |
|
|
527 |
C |
p. 602-619 |
artikel |
29 |
Privacy by Evidence: A Methodology to develop privacy-friendly software applications
|
Barbosa, Pedro |
|
|
527 |
C |
p. 294-310 |
artikel |
30 |
Privacy-enhanced remote data integrity checking with updatable timestamp
|
Wu, Tong |
|
|
527 |
C |
p. 210-226 |
artikel |
31 |
Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives
|
Feng, Jun |
|
|
527 |
C |
p. 341-355 |
artikel |
32 |
Privacy-Preserving distributed deep learning based on secret sharing
|
Duan, Jia |
|
|
527 |
C |
p. 108-127 |
artikel |
33 |
Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing
|
Tang, Wenjuan |
|
|
527 |
C |
p. 477-492 |
artikel |
34 |
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT
|
Su, Mang |
|
|
527 |
C |
p. 533-547 |
artikel |
35 |
Quantum-inspired algorithm with fitness landscape approximation in reduced dimensional spaces for numerical function optimization
|
Mu, Lei |
|
|
527 |
C |
p. 253-278 |
artikel |
36 |
Robust Manhattan non-negative matrix factorization for image recovery and representation
|
Dai, Xiangguang |
|
|
527 |
C |
p. 70-87 |
artikel |
37 |
Skewed non-Gaussian GARCH models for cryptocurrencies volatility modelling
|
Cerqueti, Roy |
|
|
527 |
C |
p. 1-26 |
artikel |
38 |
Special Section on Privacy Computing: Principles and Applications
|
Chen, Jinjun |
|
|
527 |
C |
p. 293 |
artikel |