nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions
|
Garg, Sakshi |
|
|
14 |
2 |
p. 978-1005 |
artikel |
2 |
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
|
Wu, Bin |
|
|
14 |
2 |
p. 852-872 |
artikel |
3 |
A consensus-based cooperative Spectrum sensing technique for CR-VANET
|
Zargarzadeh, Sahar |
|
|
14 |
2 |
p. 781-793 |
artikel |
4 |
AC-RDV: a novel ant colony system for roadside units deployment in vehicular ad hoc networks
|
Guerna, Abderrahim |
|
|
14 |
2 |
p. 627-643 |
artikel |
5 |
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT
|
Mamun, Mohammad |
|
|
14 |
2 |
p. 708-721 |
artikel |
6 |
An efficient distributed algorithm for target-coverage preservation in wireless sensor networks
|
Nguyen, Tri Gia |
|
|
14 |
2 |
p. 453-466 |
artikel |
7 |
A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks
|
Arora, Vishal Kumar |
|
|
14 |
2 |
p. 807-820 |
artikel |
8 |
A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing
|
Zeng, Feng |
|
|
14 |
2 |
p. 467-481 |
artikel |
9 |
A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs
|
Wang, Zuyan |
|
|
14 |
2 |
p. 655-671 |
artikel |
10 |
A reliable peer-to-peer streaming protocol in low-capacity networks
|
Ojo, Oluwafolake E. |
|
|
14 |
2 |
p. 559-584 |
artikel |
11 |
A reliable tree-based data aggregation method in wireless sensor networks
|
Hasheminejad, Elham |
|
|
14 |
2 |
p. 873-887 |
artikel |
12 |
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks
|
Guo, Junyan |
|
|
14 |
2 |
p. 898-916 |
artikel |
13 |
A secure vehicle theft detection framework using Blockchain and smart contract
|
Das, Debashis |
|
|
14 |
2 |
p. 672-686 |
artikel |
14 |
Behavior prediction based on interest characteristic and user communication in opportunistic social networks
|
Wu, Jia |
|
|
14 |
2 |
p. 1006-1018 |
artikel |
15 |
Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem
|
Xu, Jieyu |
|
|
14 |
2 |
p. 644-654 |
artikel |
16 |
Blind signcryption scheme based on hyper elliptic curves cryptosystem
|
Ullah, Shamsher |
|
|
14 |
2 |
p. 917-932 |
artikel |
17 |
Cancelable Iris template for secure authentication based on random projection and double random phase encoding
|
Rajasekar, Vani |
|
|
14 |
2 |
p. 747-762 |
artikel |
18 |
Charging path optimization for wireless rechargeable sensor network
|
Wang, Qian |
|
|
14 |
2 |
p. 497-506 |
artikel |
19 |
Construction of multi-level data aggregation trees for energy efficiency and delivery delay in machine-to-machine communications
|
Challa, Prasad |
|
|
14 |
2 |
p. 585-598 |
artikel |
20 |
Correction to: Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells
|
Balachandran, Malini |
|
|
14 |
2 |
p. 1019 |
artikel |
21 |
Cross-domain trust management mechanism for internet of things systems
|
Wu, Xu |
|
|
14 |
2 |
p. 933-947 |
artikel |
22 |
Design and implementation of blockchain-based digital advertising media promotion system
|
Ding, Yong |
|
|
14 |
2 |
p. 482-496 |
artikel |
23 |
Developing new connectivity architectures for local sensing and control IoT systems
|
Malekzadeh, Mina |
|
|
14 |
2 |
p. 609-626 |
artikel |
24 |
Integrating the device-to-device communication technology into edge computing: A case study
|
Yuan, Peiyan |
|
|
14 |
2 |
p. 599-608 |
artikel |
25 |
Light forwarding based optimal CCN content delivery: a case study in metropolitan area network
|
Zhang, Songzhu |
|
|
14 |
2 |
p. 794-806 |
artikel |
26 |
Low energy consumption routing algorithm based on message importance in opportunistic social networks
|
Yin, Sheng |
|
|
14 |
2 |
p. 948-961 |
artikel |
27 |
Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks
|
Shahbaz, Amir Nader |
|
|
14 |
2 |
p. 541-558 |
artikel |
28 |
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks
|
Harn, Lein |
|
|
14 |
2 |
p. 722-728 |
artikel |
29 |
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
|
G, Irin Loretta |
|
|
14 |
2 |
p. 821-836 |
artikel |
30 |
Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey
|
Khatibi, Elahe |
|
|
14 |
2 |
p. 729-746 |
artikel |
31 |
Revisiting the coupon collector’s problem to unveil users’ online sessions in networked systems
|
Cordeiro, Weverton |
|
|
14 |
2 |
p. 687-707 |
artikel |
32 |
SAES: A self-checking authentication scheme with higher efficiency and security for VANET
|
Jiang, Haobin |
|
|
14 |
2 |
p. 528-540 |
artikel |
33 |
Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering
|
Ding, Yanwu |
|
|
14 |
2 |
p. 507-527 |
artikel |
34 |
Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node
|
Tang, Kun |
|
|
14 |
2 |
p. 837-851 |
artikel |
35 |
Task allocation through fuzzy logic based participant density analysis in mobile crowd sensing
|
Yang, Guisong |
|
|
14 |
2 |
p. 763-780 |
artikel |
36 |
Task scheduling in cloud-fog computing systems
|
Guevara, Judy C. |
|
|
14 |
2 |
p. 962-977 |
artikel |
37 |
Trust estimation in peer-to-peer network using BLUE
|
Gupta, Ruchir |
|
|
14 |
2 |
p. 888-897 |
artikel |