nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An efficient cost optimized scheduling for spot instances in heterogeneous cloud environment
|
Domanal, Shridhar G. |
|
|
84 |
C |
p. 11-21 |
artikel |
2 |
An efficient key agreement protocol for Sybil-precaution in online social networks
|
Al-Qurishi, Muhammad |
|
|
84 |
C |
p. 139-148 |
artikel |
3 |
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
|
Feng, Qi |
|
|
84 |
C |
p. 239-251 |
artikel |
4 |
An optimization of virtual machine selection and placement by using memory content similarity for server consolidation in cloud
|
Li, Huixi |
|
|
84 |
C |
p. 98-107 |
artikel |
5 |
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs
|
Islam, SK Hafizul |
|
|
84 |
C |
p. 216-227 |
artikel |
6 |
A secure chaotic map-based remote authentication scheme for telecare medicine information systems
|
Li, Xiong |
|
|
84 |
C |
p. 149-159 |
artikel |
7 |
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
|
Ali, Rifaqat |
|
|
84 |
C |
p. 200-215 |
artikel |
8 |
A similarity-aware encrypted deduplication scheme with flexible access control in the cloud
|
Zhou, Yukun |
|
|
84 |
C |
p. 177-189 |
artikel |
9 |
Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system
|
Yang, Yang |
|
|
84 |
C |
p. 160-176 |
artikel |
10 |
Decentralized and locality aware replication method for DHT-based P2P storage systems
|
Hassanzadeh-Nazarabadi, Yahya |
|
|
84 |
C |
p. 32-46 |
artikel |
11 |
Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications
|
Abbasinezhad-Mood, Dariush |
|
|
84 |
C |
p. 47-57 |
artikel |
12 |
Editorial Board
|
|
|
|
84 |
C |
p. ii |
artikel |
13 |
Event-driven approach for predictive and proactive management of SLA violations in the Cloud of Things
|
Nawaz, Falak |
|
|
84 |
C |
p. 78-97 |
artikel |
14 |
Filtering irrelevant sequential data out of game session telemetry though similarity collapses
|
Kohwalter, Troy |
|
|
84 |
C |
p. 108-122 |
artikel |
15 |
Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
|
Guo, Cheng |
|
|
84 |
C |
p. 190-199 |
artikel |
16 |
Key management and key distribution for secure group communication in mobile and cloud network
|
Vijayakumar, P. |
|
|
84 |
C |
p. 123-125 |
artikel |
17 |
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions
|
Chen, Zitao |
|
|
84 |
C |
p. 126-138 |
artikel |
18 |
Mimic computing for password recovery
|
Li, Bin |
|
|
84 |
C |
p. 58-77 |
artikel |
19 |
On the adequacy of lightweight thread approaches for high-level parallel programming models
|
Castelló, Adrián |
|
|
84 |
C |
p. 22-31 |
artikel |
20 |
Power domain NOMA to support group communication in public safety networks
|
Su, Xin |
|
|
84 |
C |
p. 228-238 |
artikel |
21 |
T1000: Mitigating the memory footprint of convolution neural networks with decomposition and re-fusion
|
Liu, Changxi |
|
|
84 |
C |
p. 1-10 |
artikel |