Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             19 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A model-driven approach to adopt good practices for agile process configuration and certification Giachetti, Giovanni

86 C p.
artikel
2 A robust analysis of adversarial attacks on federated learning environments Nair, Akarsh K.

86 C p.
artikel
3 A secure and efficient certificateless authenticated key agreement protocol for smart healthcare Ma, Yuqian

86 C p.
artikel
4 A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates Zhang, Mingwu

86 C p.
artikel
5 Difference-based firefly programming for symbolic regression problems Aliwi, Mohamed

86 C p.
artikel
6 Editorial Board
86 C p.
artikel
7 FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice Yang, Xinmin

86 C p.
artikel
8 Full black-box retrievable and accountable identity-based encryption Zhao, Zhen

86 C p.
artikel
9 Hybrid unsupervised web-attack detection and classification – A deep learning approach Pillai, Seema

86 C p.
artikel
10 More efficient tightly-secure lattice-based IBE with equality test Qu, Quanbo

86 C p.
artikel
11 Multi-key Fully Homomorphic Encryption without CRS from RLWE Luo, Fucai

86 C p.
artikel
12 Mutual authentication scheme for smart devices in IoT-enabled smart home systems Ma, Qingru

86 C p.
artikel
13 Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations Duong, May Thu

86 C p.
artikel
14 Practical reusable garbled circuits with parallel updates Zhao, Qingsong

86 C p.
artikel
15 Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing Nair, Akarsh K.

86 C p.
artikel
16 Proofs of retrievability with tag outsourcing based on Goppa codes Ji, Shan

86 C p.
artikel
17 The MauMe network - A LoRa multi-hop collaborative protocol and low-cost implementation example Mari, Jean-Martial

86 C p.
artikel
18 Towards a method to quantitatively measure toolchain interoperability in the engineering lifecycle: A case study of digital hardware design Alvarez-Rodríguez, Jose María

86 C p.
artikel
19 Using a process algebra interface for verification and validation of UML statecharts Doostali, Saeed

86 C p.
artikel
                             19 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland