nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accountable outsourcing data storage atop blockchain
|
Xie, Min |
|
|
82 |
C |
p. |
artikel |
2 |
Adversarial examples generated from sample subspace
|
Liu, Xiaozhang |
|
|
82 |
C |
p. |
artikel |
3 |
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
|
Wang, Haiyan |
|
|
82 |
C |
p. |
artikel |
4 |
Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI
|
Henriquez, Valeria |
|
|
82 |
C |
p. |
artikel |
5 |
An adaptive access control scheme based on trust degrees for edge computing
|
Zheng, Wenying |
|
|
82 |
C |
p. |
artikel |
6 |
ANDES: An approach to embed search services on the Web browser
|
Bosetti, Gabriela |
|
|
82 |
C |
p. |
artikel |
7 |
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient
|
Liu, Jiabao |
|
|
82 |
C |
p. |
artikel |
8 |
Application of ISO/IEC TR 33014 to the improvement of Green IT processes
|
Patón-Romero, J. David |
|
|
82 |
C |
p. |
artikel |
9 |
A service recommendation system based on rough multidimensional matrix in cloud-based environment
|
Zhong, Daixing |
|
|
82 |
C |
p. |
artikel |
10 |
Blockchain-based verifiable privacy-preserving data classification protocol for medical data
|
Zheng, Xiaokun |
|
|
82 |
C |
p. |
artikel |
11 |
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems
|
Li, Wanhua |
|
|
82 |
C |
p. |
artikel |
12 |
Cryptanalysis of an additively homomorphic public key encryption scheme
|
Hong, Zhiyong |
|
|
82 |
C |
p. |
artikel |
13 |
Demand response process assessment model: Development and case study assessment
|
İLİSULU, Fadime |
|
|
82 |
C |
p. |
artikel |
14 |
Detection of web service anti-patterns using weighted extreme learning machine
|
Tummalapalli, Sahithi |
|
|
82 |
C |
p. |
artikel |
15 |
Editorial Board
|
|
|
|
82 |
C |
p. |
artikel |
16 |
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud
|
Yang, Lina |
|
|
82 |
C |
p. |
artikel |
17 |
Efficient public-key authenticated deniable encryption schemes
|
Cao, Yanmei |
|
|
82 |
C |
p. |
artikel |
18 |
Enhancing differential evolution with a target vector replacement strategy
|
Zeng, Zhiqiang |
|
|
82 |
C |
p. |
artikel |
19 |
Information technologies exposing children to privacy risks: Domains and children-specific technical controls
|
Crepax, Tommaso |
|
|
82 |
C |
p. |
artikel |
20 |
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications
|
Seyfollahi, Ali |
|
|
82 |
C |
p. |
artikel |
21 |
Model-driven approach running route two-level SVD with context information and feature entities in recommender system
|
Vahidy Rodpysh, Keyvan |
|
|
82 |
C |
p. |
artikel |
22 |
Provable data deletion from efficient data integrity auditing and insertion in cloud storage
|
Yang, Changsong |
|
|
82 |
C |
p. |
artikel |
23 |
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester
|
Bathre, Mukesh |
|
|
82 |
C |
p. |
artikel |