nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A critical analysis of Zero Trust Architecture (ZTA)
|
Fernandez, Eduardo B. |
|
|
89 |
C |
p. |
artikel |
2 |
A heuristic design toolkit for web conferencing software based on self-determination theory
|
Wu, Ming |
|
|
89 |
C |
p. |
artikel |
3 |
An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm
|
Kolukisa, Burak |
|
|
89 |
C |
p. |
artikel |
4 |
A new modified Skew Tent Map and its application in pseudo-random number generator
|
Umar, Talha |
|
|
89 |
C |
p. |
artikel |
5 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
|
Liu, Zi-Yuan |
|
|
89 |
C |
p. |
artikel |
6 |
BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records
|
Shen, Fanfan |
|
|
89 |
C |
p. |
artikel |
7 |
Compact and efficient KEMs over NTRU lattices
|
Liang, Zhichuang |
|
|
89 |
C |
p. |
artikel |
8 |
Disentangling different levels of GAN fingerprints for task-specific forensics
|
Liu, Chi |
|
|
89 |
C |
p. |
artikel |
9 |
Editorial
|
Colomo-Palacios, Ricardo |
|
|
89 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
89 |
C |
p. |
artikel |
11 |
Fast intensive validation on blockchain with scale-out dispute resolution
|
Wang, Mingming |
|
|
89 |
C |
p. |
artikel |
12 |
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment
|
Ma, Sha |
|
|
89 |
C |
p. |
artikel |
13 |
H T 2 R E P : A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE
|
Li, Tao |
|
|
89 |
C |
p. |
artikel |
14 |
Lattice-based dynamic universal accumulator: Design and application
|
Zhao, Yong |
|
|
89 |
C |
p. |
artikel |
15 |
Local differential privacy and its applications: A comprehensive survey
|
Yang, Mengmeng |
|
|
89 |
C |
p. |
artikel |
16 |
MRAN: Multimodal relationship-aware attention network for fake news detection
|
Yang, Hongyu |
|
|
89 |
C |
p. |
artikel |
17 |
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping
|
Xie, Lixia |
|
|
89 |
C |
p. |
artikel |
18 |
Patient-centric medical service matching with fine-grained access control and dynamic user management
|
Wu, Shu |
|
|
89 |
C |
p. |
artikel |
19 |
Privacy-preserving compromised credential checking protocol for account protection
|
Yu, Xiaopeng |
|
|
89 |
C |
p. |
artikel |
20 |
Provably secure multi-signature scheme based on the standard SM2 signature scheme
|
Xiao, Yuchen |
|
|
89 |
C |
p. |
artikel |
21 |
Secure decision tree classification with decentralized authorization and access control
|
Wang, Chen |
|
|
89 |
C |
p. |
artikel |
22 |
When deep learning meets watermarking: A survey of application, attacks and defenses
|
Chen, Huajie |
|
|
89 |
C |
p. |
artikel |