nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new secure arrangement for privacy-preserving data collection
|
Song, Jingcheng |
|
|
80 |
C |
p. |
artikel |
2 |
An IoT-based approach for optimal relative positioning of solar panel arrays during backtracking
|
Yakut, M. |
|
|
80 |
C |
p. |
artikel |
3 |
A novel and efficient index based web service discovery approach
|
Abdelli, Abdelkrim |
|
|
80 |
C |
p. |
artikel |
4 |
A process assessment model for big data analytics
|
Gökalp, Mert Onuralp |
|
|
80 |
C |
p. |
artikel |
5 |
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints
|
Azadiabad, Siamak |
|
|
80 |
C |
p. |
artikel |
6 |
Designing secure and lightweight user access to drone for smart city surveillance
|
Hussain, Sajid |
|
|
80 |
C |
p. |
artikel |
7 |
Editorial Board
|
|
|
|
80 |
C |
p. |
artikel |
8 |
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks
|
Wu, Yulin |
|
|
80 |
C |
p. |
artikel |
9 |
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
|
Wan Mohd Ruzai, Wan Nur Aqlili |
|
|
80 |
C |
p. |
artikel |
10 |
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses
|
Albahri, A.S. |
|
|
80 |
C |
p. |
artikel |
11 |
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security
|
Wu, Yulin |
|
|
80 |
C |
p. |
artikel |
12 |
Privacy-preserving Byzantine-robust federated learning
|
Ma, Xu |
|
|
80 |
C |
p. |
artikel |
13 |
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption
|
Ku, Hanchao |
|
|
80 |
C |
p. |
artikel |
14 |
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment
|
Bera, Basudeb |
|
|
80 |
C |
p. |
artikel |
15 |
Repudiable ring signature: Stronger security and logarithmic-size
|
Lin, Hao |
|
|
80 |
C |
p. |
artikel |
16 |
Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture
|
Chen, Qi |
|
|
80 |
C |
p. |
artikel |