nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A foggy research future: Advances and future opportunities in fog computing research
|
Choo, Kim-Kwang Raymond |
|
2018 |
78 |
P2 |
p. 677-679 |
artikel |
2 |
An efficient access control scheme with outsourcing capability and attribute update for fog computing
|
Zhang, Peng |
|
2018 |
78 |
P2 |
p. 753-762 |
artikel |
3 |
An integrated information lifecycle management framework for exploiting social network data to identify dynamic large crowd concentration events in smart cities applications
|
Kousiouris, George |
|
2018 |
78 |
P2 |
p. 516-530 |
artikel |
4 |
Anonymous and secure aggregation scheme in fog-based public cloud computing
|
Wang, Huaqun |
|
2018 |
78 |
P2 |
p. 712-719 |
artikel |
5 |
An SVM-based collaborative filtering approach for Top-N web services recommendation
|
Ren, Lifang |
|
2018 |
78 |
P2 |
p. 531-543 |
artikel |
6 |
A reliable IoT system for Personal Healthcare Devices
|
Woo, Min Woo |
|
2018 |
78 |
P2 |
p. 626-640 |
artikel |
7 |
A variant of password authenticated key exchange protocol
|
Zhang, Yuexin |
|
2018 |
78 |
P2 |
p. 699-711 |
artikel |
8 |
Bitcoin-based fair payments for outsourcing computations of fog devices
|
Huang, Hui |
|
2018 |
78 |
P2 |
p. 850-858 |
artikel |
9 |
CCA-secure ABE with outsourced decryption for fog computing
|
Zuo, Cong |
|
2018 |
78 |
P2 |
p. 730-738 |
artikel |
10 |
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
|
Jiang, Yinhao |
|
2018 |
78 |
P2 |
p. 720-729 |
artikel |
11 |
Controlling and filtering users data in Intelligent Transportation System
|
Gosman, Catalin |
|
2018 |
78 |
P2 |
p. 807-816 |
artikel |
12 |
CUIDATS: An RFID–WSN hybrid monitoring system for smart health care environments
|
Adame, Toni |
|
2018 |
78 |
P2 |
p. 602-615 |
artikel |
13 |
Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT + OSINT): A timely and cohesive mix
|
Quick, Darren |
|
2018 |
78 |
P2 |
p. 558-567 |
artikel |
14 |
Editorial Board
|
|
|
2018 |
78 |
P2 |
p. IFC |
artikel |
15 |
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
|
Rahmani, Amir M. |
|
2018 |
78 |
P2 |
p. 641-658 |
artikel |
16 |
Exploring the relationship between architectures and management policies in the design of NUCA-based chip multicore systems
|
Bartolini, Sandro |
|
2018 |
78 |
P2 |
p. 481-501 |
artikel |
17 |
Hybrid privacy-preserving clinical decision support system in fog–cloud computing
|
Liu, Ximeng |
|
2018 |
78 |
P2 |
p. 825-837 |
artikel |
18 |
Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics
|
Firouzi, Farshad |
|
2018 |
78 |
P2 |
p. 583-586 |
artikel |
19 |
Internet of Things security and forensics: Challenges and opportunities
|
Conti, Mauro |
|
2018 |
78 |
P2 |
p. 544-546 |
artikel |
20 |
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
|
Roman, Rodrigo |
|
2018 |
78 |
P2 |
p. 680-698 |
artikel |
21 |
Position based cryptography with location privacy: A step for Fog Computing
|
Yang, Rupeng |
|
2018 |
78 |
P2 |
p. 799-806 |
artikel |
22 |
Power transmission and workload balancing policies in eHealth mobile cloud computing scenarios
|
Pagán, Josué |
|
2018 |
78 |
P2 |
p. 587-601 |
artikel |
23 |
Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities
|
Chen, Bo-Wei |
|
2018 |
78 |
P2 |
p. 859-866 |
artikel |
24 |
Privacy preserving cloud data auditing with efficient key update
|
Li, Yannan |
|
2018 |
78 |
P2 |
p. 789-798 |
artikel |
25 |
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
|
Koo, Dongyoung |
|
2018 |
78 |
P2 |
p. 739-752 |
artikel |
26 |
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems
|
Tonyali, Samet |
|
2018 |
78 |
P2 |
p. 547-557 |
artikel |
27 |
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
|
Ge, Mengmeng |
|
2018 |
78 |
P2 |
p. 568-582 |
artikel |
28 |
Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs
|
Bochenina, Klavdiya |
|
2018 |
78 |
P2 |
p. 502-515 |
artikel |
29 |
Secure intelligent traffic light control using fog computing
|
Liu, Jian |
|
2018 |
78 |
P2 |
p. 817-824 |
artikel |
30 |
Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare
|
Farahani, Bahar |
|
2018 |
78 |
P2 |
p. 659-676 |
artikel |
31 |
Towards leakage-resilient fine-grained access control in fog computing
|
Yu, Zuoxia |
|
2018 |
78 |
P2 |
p. 763-777 |
artikel |
32 |
Universal and secure object ownership transfer protocol for the Internet of Things
|
Ray, Biplob R. |
|
2018 |
78 |
P2 |
p. 838-849 |
artikel |
33 |
Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique
|
Ammae, Osamu |
|
2018 |
78 |
P2 |
p. 616-625 |
artikel |
34 |
Verifiable searchable encryption with aggregate keys for data sharing system
|
Liu, Zheli |
|
2018 |
78 |
P2 |
p. 778-788 |
artikel |