Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             23 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accountable outsourcing data storage atop blockchain Xie, Min

82 C p.
artikel
2 Adversarial examples generated from sample subspace Liu, Xiaozhang

82 C p.
artikel
3 A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing Wang, Haiyan

82 C p.
artikel
4 Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI Henriquez, Valeria

82 C p.
artikel
5 An adaptive access control scheme based on trust degrees for edge computing Zheng, Wenying

82 C p.
artikel
6 ANDES: An approach to embed search services on the Web browser Bosetti, Gabriela

82 C p.
artikel
7 An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient Liu, Jiabao

82 C p.
artikel
8 Application of ISO/IEC TR 33014 to the improvement of Green IT processes Patón-Romero, J. David

82 C p.
artikel
9 A service recommendation system based on rough multidimensional matrix in cloud-based environment Zhong, Daixing

82 C p.
artikel
10 Blockchain-based verifiable privacy-preserving data classification protocol for medical data Zheng, Xiaokun

82 C p.
artikel
11 Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems Li, Wanhua

82 C p.
artikel
12 Cryptanalysis of an additively homomorphic public key encryption scheme Hong, Zhiyong

82 C p.
artikel
13 Demand response process assessment model: Development and case study assessment İLİSULU, Fadime

82 C p.
artikel
14 Detection of web service anti-patterns using weighted extreme learning machine Tummalapalli, Sahithi

82 C p.
artikel
15 Editorial Board
82 C p.
artikel
16 Efficient plane extraction using normal estimation and RANSAC from 3D point cloud Yang, Lina

82 C p.
artikel
17 Efficient public-key authenticated deniable encryption schemes Cao, Yanmei

82 C p.
artikel
18 Enhancing differential evolution with a target vector replacement strategy Zeng, Zhiqiang

82 C p.
artikel
19 Information technologies exposing children to privacy risks: Domains and children-specific technical controls Crepax, Tommaso

82 C p.
artikel
20 MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications Seyfollahi, Ali

82 C p.
artikel
21 Model-driven approach running route two-level SVD with context information and feature entities in recommender system Vahidy Rodpysh, Keyvan

82 C p.
artikel
22 Provable data deletion from efficient data integrity auditing and insertion in cloud storage Yang, Changsong

82 C p.
artikel
23 Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester Bathre, Mukesh

82 C p.
artikel
                             23 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland