nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A dynamic data access control scheme for hierarchical structures in big data
|
Deng, Xinxin |
|
|
220 |
C |
p. 128-137 |
artikel |
2 |
A robust and effective 3-factor authentication protocol for smart factory in IIoT
|
Zou, Shihong |
|
|
220 |
C |
p. 81-93 |
artikel |
3 |
Corrigendum to ‘A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver’ [Comput. Commun. 219 (2024) 173–181]
|
Aslam, Muhammad |
|
|
220 |
C |
p. 64 |
artikel |
4 |
Detecting abnormal behaviors in smart contracts using opcode sequences
|
Li, Peiqiang |
|
|
220 |
C |
p. 12-22 |
artikel |
5 |
DRAMS: Double-RIS assisted multihop routing scheme for device-to-device communication
|
Sau, Lakshmikanta |
|
|
220 |
C |
p. 52-63 |
artikel |
6 |
Editorial Board
|
|
|
|
220 |
C |
p. ii-iii |
artikel |
7 |
Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV
|
Jin, Chunhua |
|
|
220 |
C |
p. 149-159 |
artikel |
8 |
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model
|
Zhu, Qingyi |
|
|
220 |
C |
p. 1-11 |
artikel |
9 |
Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture
|
SumanPrakash, P. |
|
|
220 |
C |
p. 94-107 |
artikel |
10 |
Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy
|
Moradi, Farzad |
|
|
220 |
C |
p. 108-127 |
artikel |
11 |
LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid
|
Wang, Zhong |
|
|
220 |
C |
p. 35-42 |
artikel |
12 |
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals
|
Chang, Zhiwei |
|
|
220 |
C |
p. 138-148 |
artikel |
13 |
PrioMQTT: A prioritized version of the MQTT protocol
|
Patti, Gaetano |
|
|
220 |
C |
p. 43-51 |
artikel |
14 |
Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems
|
Wang, Chen |
|
|
220 |
C |
p. 65-80 |
artikel |
15 |
Secrecy Enhancement of relay cooperative NOMA network based on user behavior
|
Song, Xin |
|
|
220 |
C |
p. 23-34 |
artikel |