nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach
|
Fan, Yuqi |
|
|
13 |
5 |
p. 1486-1504 |
artikel |
2 |
A lightweight three-factor authentication protocol for digital rights management system
|
Yu, SungJin |
|
|
13 |
5 |
p. 1340-1356 |
artikel |
3 |
An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET
|
Srivastava, Ankita |
|
|
13 |
5 |
p. 1375-1393 |
artikel |
4 |
A near-optimal content placement in D2D underlaid cellular networks
|
Feng, Guangsheng |
|
|
13 |
5 |
p. 1799-1813 |
artikel |
5 |
An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs
|
Singh, Samayveer |
|
|
13 |
5 |
p. 1357-1374 |
artikel |
6 |
A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance
|
Ali, Zainab H. |
|
|
13 |
5 |
p. 1539-1566 |
artikel |
7 |
A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks
|
Karbasi, Amir Hassani |
|
|
13 |
5 |
p. 1423-1441 |
artikel |
8 |
A prediction model of cloud security situation based on evolutionary functional network
|
Xie, Baowen |
|
|
13 |
5 |
p. 1312-1326 |
artikel |
9 |
A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN
|
Guo, Yunhai |
|
|
13 |
5 |
p. 1442-1456 |
artikel |
10 |
A system for real-time intervention in negative emotional contagion in a smart classroom deployed under edge computing service infrastructure
|
Li, Jian |
|
|
13 |
5 |
p. 1706-1719 |
artikel |
11 |
A trust evaluation system based on reputation data in Mobile edge computing network
|
Deng, Xiaoheng |
|
|
13 |
5 |
p. 1744-1755 |
artikel |
12 |
Attribute-based encryption with outsourced decryption in blockchain
|
Zheng, Hui |
|
|
13 |
5 |
p. 1643-1655 |
artikel |
13 |
Automatic ICA detection in online social networks with PageRank
|
Zare, Maryam |
|
|
13 |
5 |
p. 1297-1311 |
artikel |
14 |
AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network
|
Ojo, Oluwafolake E. |
|
|
13 |
5 |
p. 1672-1687 |
artikel |
15 |
Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks
|
Yu, Genghua |
|
|
13 |
5 |
p. 1839-1852 |
artikel |
16 |
Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles
|
Xie, Jiajia |
|
|
13 |
5 |
p. 1788-1798 |
artikel |
17 |
Device-to-device streaming video caching for cellular download cost reduction
|
Wang, Rui |
|
|
13 |
5 |
p. 1457-1473 |
artikel |
18 |
Editorial: Emerging Trends on Data Analytics at the Network Edge
|
Zhang, Deyu |
|
|
13 |
5 |
p. 1704-1705 |
artikel |
19 |
Efficient caching strategy in wireless networks with mobile edge computing
|
Chen, Ying |
|
|
13 |
5 |
p. 1756-1766 |
artikel |
20 |
Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks
|
Kuang, Zhufang |
|
|
13 |
5 |
p. 1814-1829 |
artikel |
21 |
Hybrid conditional privacy-preserving authentication scheme for VANETs
|
Wang, Shibin |
|
|
13 |
5 |
p. 1600-1615 |
artikel |
22 |
Integration of ZigBee based GPS receiver to CAN network for precision farming applications
|
Ünal, İlker |
|
|
13 |
5 |
p. 1394-1405 |
artikel |
23 |
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
|
Tahavori, Mahdi |
|
|
13 |
5 |
p. 1616-1628 |
artikel |
24 |
Link reliability-based multi-hop directional location routing in vehicular ad hoc network
|
Rana, Kamlesh Kumar |
|
|
13 |
5 |
p. 1656-1671 |
artikel |
25 |
Optimality analysis of locality-aware tit-for-tat-based P2P file distribution
|
Nishi, Yohei |
|
|
13 |
5 |
p. 1688-1703 |
artikel |
26 |
Performance analysis of edge-PLCs enabled industrial Internet of things
|
Peng, Yanjun |
|
|
13 |
5 |
p. 1830-1838 |
artikel |
27 |
Polynomial regressors based data-driven control for autonomous underwater vehicles
|
Li, Hongran |
|
|
13 |
5 |
p. 1767-1775 |
artikel |
28 |
Power control of D2D communication based on quality of service assurance under imperfect channel information
|
Liu, Zhixin |
|
|
13 |
5 |
p. 1327-1339 |
artikel |
29 |
PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks
|
Nunoo-Mensah, Henry |
|
|
13 |
5 |
p. 1505-1525 |
artikel |
30 |
RAIAP: renewable authentication on isolated anonymous profiles
|
Pedrosa, Micael |
|
|
13 |
5 |
p. 1577-1599 |
artikel |
31 |
Resource scheduling for delay-sensitive application in three-layer fog-to-cloud architecture
|
Ren, Zibin |
|
|
13 |
5 |
p. 1474-1485 |
artikel |
32 |
Revenue-optimal task scheduling and resource management for IoT batch jobs in mobile edge computing
|
Huang, Jiwei |
|
|
13 |
5 |
p. 1776-1787 |
artikel |
33 |
RPRTD: Routing protocol based on remaining time to encounter nodes with destination node in delay tolerant network using artificial neural network
|
Karami, Ahmad |
|
|
13 |
5 |
p. 1406-1422 |
artikel |
34 |
Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks
|
Kumbhar, Farooque Hassan |
|
|
13 |
5 |
p. 1526-1538 |
artikel |
35 |
Structuring communities for sharing human digital memories in a social P2P network
|
Rahman, Haseeb Ur |
|
|
13 |
5 |
p. 1629-1642 |
artikel |
36 |
Toward efficient and effective bullying detection in online social network
|
Wu, Jiale |
|
|
13 |
5 |
p. 1567-1576 |
artikel |
37 |
Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems
|
Teng, Haojun |
|
|
13 |
5 |
p. 1720-1743 |
artikel |