Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             16 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A new secure arrangement for privacy-preserving data collection Song, Jingcheng

80 C p.
artikel
2 An IoT-based approach for optimal relative positioning of solar panel arrays during backtracking Yakut, M.

80 C p.
artikel
3 A novel and efficient index based web service discovery approach Abdelli, Abdelkrim

80 C p.
artikel
4 A process assessment model for big data analytics Gökalp, Mert Onuralp

80 C p.
artikel
5 Availability and service disruption of network services: From high-level requirements to low-level configuration constraints Azadiabad, Siamak

80 C p.
artikel
6 Designing secure and lightweight user access to drone for smart city surveillance Hussain, Sajid

80 C p.
artikel
7 Editorial Board
80 C p.
artikel
8 Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks Wu, Yulin

80 C p.
artikel
9 Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis Wan Mohd Ruzai, Wan Nur Aqlili

80 C p.
artikel
10 Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses Albahri, A.S.

80 C p.
artikel
11 Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security Wu, Yulin

80 C p.
artikel
12 Privacy-preserving Byzantine-robust federated learning Ma, Xu

80 C p.
artikel
13 Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption Ku, Hanchao

80 C p.
artikel
14 Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment Bera, Basudeb

80 C p.
artikel
15 Repudiable ring signature: Stronger security and logarithmic-size Lin, Hao

80 C p.
artikel
16 Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture Chen, Qi

80 C p.
artikel
                             16 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland