Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A BERT-Based Sequential POI Recommender system in Social Media Noorian, A.

87 C p.
artikel
2 Abuse-resistant deniable encryption Cao, Yanmei

87 C p.
artikel
3 Adaptive optimized residual convolutional image annotation model with bionic feature selection model Palekar, Vikas

87 C p.
artikel
4 A lattice-based public key encryption scheme with delegated equality test Xiao, Kaifeng

87 C p.
artikel
5 A lightweight delegated private set intersection cardinality protocol Yang, Xiaoyi

87 C p.
artikel
6 An Identity-Based Encryption with Equality Test scheme for healthcare social apps Lu, Jingwei

87 C p.
artikel
7 A regulated anonymous cryptocurrency with batch linkability Yu, Qiming

87 C p.
artikel
8 Create your own MUSE: A method for updating security level evaluation instruments Seeba, Mari

87 C p.
artikel
9 Designing novel proxy-based access control scheme for implantable medical devices Wu, Longfei

87 C p.
artikel
10 Detecting deviations in the code using architecture view-based drift analysis Uzun, Burak

87 C p.
artikel
11 Editorial Board
87 C p.
artikel
12 Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems Xu, Chang

87 C p.
artikel
13 Efficient multi-party private set intersection protocols for large participants and small sets Wei, Lifei

87 C p.
artikel
14 Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property Nitaj, Abderrahmane

87 C p.
artikel
15 Faster matrix approximate homomorphic encryption Hu, Jifa

87 C p.
artikel
16 FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment Rajak, Anjali

87 C p.
artikel
17 Inner product encryption from Middle-Product Learning With Errors Yang, Niao

87 C p.
artikel
18 Integrating the manufacturer usage description standard in the modelling of cyber–physical systems Matheu García, Sara Nieves

87 C p.
artikel
19 Intelligent and trusted metaheuristic optimization model for reliable agricultural network Rehman, Amjad

87 C p.
artikel
20 Intelligent traffic light systems using edge flow predictions Thahir, Adam Rizvi

87 C p.
artikel
21 Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits Grande, Rubén

87 C p.
artikel
22 Lattice based distributed threshold additive homomorphic encryption with application in federated learning Tian, Haibo

87 C p.
artikel
23 Lattice-based key private PREs with HRA security and PCS security Wang, Yang

87 C p.
artikel
24 On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method Li, Dun

87 C p.
artikel
25 Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises Cheng, Leixiao

87 C p.
artikel
26 Round efficient privacy-preserving federated learning based on MKFHE Liu, Wenchao

87 C p.
artikel
27 Secure cloud file sharing scheme using blockchain and attribute-based encryption Almasian, Mohammadpayam

87 C p.
artikel
28 SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size Feng, Mengqi

87 C p.
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland