Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions Garg, Sakshi

14 2 p. 978-1005
artikel
2 A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT Wu, Bin

14 2 p. 852-872
artikel
3 A consensus-based cooperative Spectrum sensing technique for CR-VANET Zargarzadeh, Sahar

14 2 p. 781-793
artikel
4 AC-RDV: a novel ant colony system for roadside units deployment in vehicular ad hoc networks Guerna, Abderrahim

14 2 p. 627-643
artikel
5 A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT Mamun, Mohammad

14 2 p. 708-721
artikel
6 An efficient distributed algorithm for target-coverage preservation in wireless sensor networks Nguyen, Tri Gia

14 2 p. 453-466
artikel
7 A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks Arora, Vishal Kumar

14 2 p. 807-820
artikel
8 A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing Zeng, Feng

14 2 p. 467-481
artikel
9 A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs Wang, Zuyan

14 2 p. 655-671
artikel
10 A reliable peer-to-peer streaming protocol in low-capacity networks Ojo, Oluwafolake E.

14 2 p. 559-584
artikel
11 A reliable tree-based data aggregation method in wireless sensor networks Hasheminejad, Elham

14 2 p. 873-887
artikel
12 A secure three-factor anonymous roaming authentication protocol using ECC for space information networks Guo, Junyan

14 2 p. 898-916
artikel
13 A secure vehicle theft detection framework using Blockchain and smart contract Das, Debashis

14 2 p. 672-686
artikel
14 Behavior prediction based on interest characteristic and user communication in opportunistic social networks Wu, Jia

14 2 p. 1006-1018
artikel
15 Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem Xu, Jieyu

14 2 p. 644-654
artikel
16 Blind signcryption scheme based on hyper elliptic curves cryptosystem Ullah, Shamsher

14 2 p. 917-932
artikel
17 Cancelable Iris template for secure authentication based on random projection and double random phase encoding Rajasekar, Vani

14 2 p. 747-762
artikel
18 Charging path optimization for wireless rechargeable sensor network Wang, Qian

14 2 p. 497-506
artikel
19 Construction of multi-level data aggregation trees for energy efficiency and delivery delay in machine-to-machine communications Challa, Prasad

14 2 p. 585-598
artikel
20 Correction to: Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells Balachandran, Malini

14 2 p. 1019
artikel
21 Cross-domain trust management mechanism for internet of things systems Wu, Xu

14 2 p. 933-947
artikel
22 Design and implementation of blockchain-based digital advertising media promotion system Ding, Yong

14 2 p. 482-496
artikel
23 Developing new connectivity architectures for local sensing and control IoT systems Malekzadeh, Mina

14 2 p. 609-626
artikel
24 Integrating the device-to-device communication technology into edge computing: A case study Yuan, Peiyan

14 2 p. 599-608
artikel
25 Light forwarding based optimal CCN content delivery: a case study in metropolitan area network Zhang, Songzhu

14 2 p. 794-806
artikel
26 Low energy consumption routing algorithm based on message importance in opportunistic social networks Yin, Sheng

14 2 p. 948-961
artikel
27 Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks Shahbaz, Amir Nader

14 2 p. 541-558
artikel
28 Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks Harn, Lein

14 2 p. 722-728
artikel
29 Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment G, Irin Loretta

14 2 p. 821-836
artikel
30 Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey Khatibi, Elahe

14 2 p. 729-746
artikel
31 Revisiting the coupon collector’s problem to unveil users’ online sessions in networked systems Cordeiro, Weverton

14 2 p. 687-707
artikel
32 SAES: A self-checking authentication scheme with higher efficiency and security for VANET Jiang, Haobin

14 2 p. 528-540
artikel
33 Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering Ding, Yanwu

14 2 p. 507-527
artikel
34 Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node Tang, Kun

14 2 p. 837-851
artikel
35 Task allocation through fuzzy logic based participant density analysis in mobile crowd sensing Yang, Guisong

14 2 p. 763-780
artikel
36 Task scheduling in cloud-fog computing systems Guevara, Judy C.

14 2 p. 962-977
artikel
37 Trust estimation in peer-to-peer network using BLUE Gupta, Ruchir

14 2 p. 888-897
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland