Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             26 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based audit approach for encrypted data in federated learning Sun, Zhe

8 5 p. 614-624
artikel
2 Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT Wang, Linjie

8 5 p. 644-653
artikel
3 An ellipse-guided routing algorithm in wireless sensor networks Yang, Jianjun

8 5 p. 770-777
artikel
4 An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things Miao, Qinyang

8 5 p. 636-643
artikel
5 A potential game-based outsourcing computation framework for multiple calculators Zhang, Duo

8 5 p. 654-663
artikel
6 A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing Paranjothi, Anirudh

8 5 p. 814-824
artikel
7 A survey on blockchain-based integrity auditing for cloud data Han, Haoxiang

8 5 p. 591-603
artikel
8 A survey on deep learning for textual emotion analysis in social networks Peng, Sancheng

8 5 p. 745-762
artikel
9 A survey on user-centric cell-free massive MIMO systems Chen, Shuaifei

8 5 p. 695-719
artikel
10 Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection Huang, Yiting

8 5 p. 604-613
artikel
11 Blockchain-based fog radio access networks: Architecture, key technologies, and challenges Wang, Zixin

8 5 p. 720-726
artikel
12 Can blockchain link the future? Qiao, Liang

8 5 p. 687-694
artikel
13 Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks Bulti, Dinkisa A.

8 5 p. 843-852
artikel
14 DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network Jiang, Peng

8 5 p. 791-803
artikel
15 Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks Zhi, Yuan

8 5 p. 834-842
artikel
16 Detecting conflict of heterogeneous access control policies Yu, Mingjie

8 5 p. 664-679
artikel
17 Editorial Board
8 5 p. ii-iii
artikel
18 Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications Yan, Zheng

8 5 p. 589-590
artikel
19 Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things Salah ud din, Muhammad

8 5 p. 778-790
artikel
20 Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis Qin, Fangchi

8 5 p. 680-686
artikel
21 Multi-objective optimization for task offloading based on network calculus in fog environments Ren, Qian

8 5 p. 825-833
artikel
22 Observer-based event-triggered networked multi-drives speed consensus Masroor, Suhaib

8 5 p. 763-769
artikel
23 Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology Shen, Yi

8 5 p. 853-863
artikel
24 Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems Wang, Dan

8 5 p. 625-635
artikel
25 Survey on recent advances in IoT application layer protocols and machine learning scope for research directions Donta, Praveen Kumar

8 5 p. 727-744
artikel
26 Using dummy data for RFID tag and reader authentication Alsaify, Baha’ A.

8 5 p. 804-813
artikel
                             26 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland