nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A BERT-Based Sequential POI Recommender system in Social Media
|
Noorian, A. |
|
|
87 |
C |
p. |
artikel |
2 |
Abuse-resistant deniable encryption
|
Cao, Yanmei |
|
|
87 |
C |
p. |
artikel |
3 |
Adaptive optimized residual convolutional image annotation model with bionic feature selection model
|
Palekar, Vikas |
|
|
87 |
C |
p. |
artikel |
4 |
A lattice-based public key encryption scheme with delegated equality test
|
Xiao, Kaifeng |
|
|
87 |
C |
p. |
artikel |
5 |
A lightweight delegated private set intersection cardinality protocol
|
Yang, Xiaoyi |
|
|
87 |
C |
p. |
artikel |
6 |
An Identity-Based Encryption with Equality Test scheme for healthcare social apps
|
Lu, Jingwei |
|
|
87 |
C |
p. |
artikel |
7 |
A regulated anonymous cryptocurrency with batch linkability
|
Yu, Qiming |
|
|
87 |
C |
p. |
artikel |
8 |
Create your own MUSE: A method for updating security level evaluation instruments
|
Seeba, Mari |
|
|
87 |
C |
p. |
artikel |
9 |
Designing novel proxy-based access control scheme for implantable medical devices
|
Wu, Longfei |
|
|
87 |
C |
p. |
artikel |
10 |
Detecting deviations in the code using architecture view-based drift analysis
|
Uzun, Burak |
|
|
87 |
C |
p. |
artikel |
11 |
Editorial Board
|
|
|
|
87 |
C |
p. |
artikel |
12 |
Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems
|
Xu, Chang |
|
|
87 |
C |
p. |
artikel |
13 |
Efficient multi-party private set intersection protocols for large participants and small sets
|
Wei, Lifei |
|
|
87 |
C |
p. |
artikel |
14 |
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property
|
Nitaj, Abderrahmane |
|
|
87 |
C |
p. |
artikel |
15 |
Faster matrix approximate homomorphic encryption
|
Hu, Jifa |
|
|
87 |
C |
p. |
artikel |
16 |
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment
|
Rajak, Anjali |
|
|
87 |
C |
p. |
artikel |
17 |
Inner product encryption from Middle-Product Learning With Errors
|
Yang, Niao |
|
|
87 |
C |
p. |
artikel |
18 |
Integrating the manufacturer usage description standard in the modelling of cyber–physical systems
|
Matheu García, Sara Nieves |
|
|
87 |
C |
p. |
artikel |
19 |
Intelligent and trusted metaheuristic optimization model for reliable agricultural network
|
Rehman, Amjad |
|
|
87 |
C |
p. |
artikel |
20 |
Intelligent traffic light systems using edge flow predictions
|
Thahir, Adam Rizvi |
|
|
87 |
C |
p. |
artikel |
21 |
Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits
|
Grande, Rubén |
|
|
87 |
C |
p. |
artikel |
22 |
Lattice based distributed threshold additive homomorphic encryption with application in federated learning
|
Tian, Haibo |
|
|
87 |
C |
p. |
artikel |
23 |
Lattice-based key private PREs with HRA security and PCS security
|
Wang, Yang |
|
|
87 |
C |
p. |
artikel |
24 |
On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method
|
Li, Dun |
|
|
87 |
C |
p. |
artikel |
25 |
Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises
|
Cheng, Leixiao |
|
|
87 |
C |
p. |
artikel |
26 |
Round efficient privacy-preserving federated learning based on MKFHE
|
Liu, Wenchao |
|
|
87 |
C |
p. |
artikel |
27 |
Secure cloud file sharing scheme using blockchain and attribute-based encryption
|
Almasian, Mohammadpayam |
|
|
87 |
C |
p. |
artikel |
28 |
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size
|
Feng, Mengqi |
|
|
87 |
C |
p. |
artikel |