nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
|
Zou, Jinglin |
|
|
3 |
1 |
p. |
artikel |
2 |
A comparative study of heuristic methods for cardinality constrained portfolio optimization
|
Fu, Lei |
|
|
3 |
1 |
p. |
artikel |
3 |
An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain
|
Jiang, Wenxian |
|
|
3 |
1 |
p. |
artikel |
4 |
A robust adversarial attack against speech recognition with UAP
|
Qin, Ziheng |
|
|
3 |
1 |
p. |
artikel |
5 |
A trustless architecture of blockchain-enabled metaverse
|
Xu, Minghui |
|
|
3 |
1 |
p. |
artikel |
6 |
Cross-domain identity authentication scheme based on blockchain and PKI system
|
Zhang, Hai |
|
|
3 |
1 |
p. |
artikel |
7 |
d -EMR: Secure and distributed Electronic Medical Record management
|
Zaghloul, Ehab |
|
|
3 |
1 |
p. |
artikel |
8 |
Discovering onion services through circuit fingerprinting attacks
|
Huang, Bin |
|
|
3 |
1 |
p. |
artikel |
9 |
Efficient secure and verifiable KNN set similarity search over outsourced clouds
|
Jiang, Xufeng |
|
|
3 |
1 |
p. |
artikel |
10 |
Optimization of multi-state generation problem based on spatial information network topology
|
Yang, Peng |
|
|
3 |
1 |
p. |
artikel |