nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A model-driven approach to adopt good practices for agile process configuration and certification
|
Giachetti, Giovanni |
|
|
86 |
C |
p. |
artikel |
2 |
A robust analysis of adversarial attacks on federated learning environments
|
Nair, Akarsh K. |
|
|
86 |
C |
p. |
artikel |
3 |
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare
|
Ma, Yuqian |
|
|
86 |
C |
p. |
artikel |
4 |
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates
|
Zhang, Mingwu |
|
|
86 |
C |
p. |
artikel |
5 |
Difference-based firefly programming for symbolic regression problems
|
Aliwi, Mohamed |
|
|
86 |
C |
p. |
artikel |
6 |
Editorial Board
|
|
|
|
86 |
C |
p. |
artikel |
7 |
FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice
|
Yang, Xinmin |
|
|
86 |
C |
p. |
artikel |
8 |
Full black-box retrievable and accountable identity-based encryption
|
Zhao, Zhen |
|
|
86 |
C |
p. |
artikel |
9 |
Hybrid unsupervised web-attack detection and classification – A deep learning approach
|
Pillai, Seema |
|
|
86 |
C |
p. |
artikel |
10 |
More efficient tightly-secure lattice-based IBE with equality test
|
Qu, Quanbo |
|
|
86 |
C |
p. |
artikel |
11 |
Multi-key Fully Homomorphic Encryption without CRS from RLWE
|
Luo, Fucai |
|
|
86 |
C |
p. |
artikel |
12 |
Mutual authentication scheme for smart devices in IoT-enabled smart home systems
|
Ma, Qingru |
|
|
86 |
C |
p. |
artikel |
13 |
Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations
|
Duong, May Thu |
|
|
86 |
C |
p. |
artikel |
14 |
Practical reusable garbled circuits with parallel updates
|
Zhao, Qingsong |
|
|
86 |
C |
p. |
artikel |
15 |
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing
|
Nair, Akarsh K. |
|
|
86 |
C |
p. |
artikel |
16 |
Proofs of retrievability with tag outsourcing based on Goppa codes
|
Ji, Shan |
|
|
86 |
C |
p. |
artikel |
17 |
The MauMe network - A LoRa multi-hop collaborative protocol and low-cost implementation example
|
Mari, Jean-Martial |
|
|
86 |
C |
p. |
artikel |
18 |
Towards a method to quantitatively measure toolchain interoperability in the engineering lifecycle: A case study of digital hardware design
|
Alvarez-Rodríguez, Jose María |
|
|
86 |
C |
p. |
artikel |
19 |
Using a process algebra interface for verification and validation of UML statecharts
|
Doostali, Saeed |
|
|
86 |
C |
p. |
artikel |