nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based quantum-secure reporting protocol
|
Banaeian Far, Saeed |
|
|
14 |
5 |
p. 2992-3011 |
artikel |
2 |
A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks
|
Chaudhary, Bhawna |
|
|
14 |
5 |
p. 3198-3212 |
artikel |
3 |
A certificateless encryption scheme based on blockchain
|
Xu, Guangxia |
|
|
14 |
5 |
p. 2952-2960 |
artikel |
4 |
Achieving IoT data security based blockchain
|
Liao, Dan |
|
|
14 |
5 |
p. 2694-2707 |
artikel |
5 |
A decentralized vehicle anti-theft system using Blockchain and smart contracts
|
Das, Debashis |
|
|
14 |
5 |
p. 2775-2788 |
artikel |
6 |
A decision support system for the uses of lightweight blockchain designs for P2P computing
|
Meng, Yuyu |
|
|
14 |
5 |
p. 2708-2718 |
artikel |
7 |
A digital rights management system based on a scalable blockchain
|
Garba, Abba |
|
|
14 |
5 |
p. 2665-2680 |
artikel |
8 |
A distributed matching game for exploring resource allocation in satellite networks
|
Mi, Xinru |
|
|
14 |
5 |
p. 3360-3371 |
artikel |
9 |
A donation tracing blockchain model using improved DPoS consensus algorithm
|
Liu, Wei |
|
|
14 |
5 |
p. 2789-2800 |
artikel |
10 |
A double-layer collaborative apportionment method for personalized and balanced routing
|
Wei, Xiaojuan |
|
|
14 |
5 |
p. 3349-3359 |
artikel |
11 |
A double steganography model combining blockchain and interplanetary file system
|
She, Wei |
|
|
14 |
5 |
p. 3029-3042 |
artikel |
12 |
AMVchain: authority management mechanism on blockchain-based voting systems
|
Li, Chenchen |
|
|
14 |
5 |
p. 2801-2812 |
artikel |
13 |
An ACO-based cross-layer routing algorithm in space-air-ground integrated networks
|
Zheng, Rongping |
|
|
14 |
5 |
p. 3372-3387 |
artikel |
14 |
Analysis and mathematical modeling of big data processing
|
Imanbayev, Kairat |
|
|
14 |
5 |
p. 2626-2634 |
artikel |
15 |
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques
|
Zafar, Shakeel |
|
|
14 |
5 |
p. 3110-3123 |
artikel |
16 |
An efficient secure data compression technique based on chaos and adaptive Huffman coding
|
Usama, Muhammad |
|
|
14 |
5 |
p. 2651-2664 |
artikel |
17 |
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
|
Zhang, Naijian |
|
|
14 |
5 |
p. 3319-3332 |
artikel |
18 |
An experimental study on performance of private blockchain in IoT applications
|
Chen, Xuan |
|
|
14 |
5 |
p. 3075-3091 |
artikel |
19 |
An integrative approach for secure data sharing in vehicular edge computing using Blockchain
|
Gawas, Mahadev |
|
|
14 |
5 |
p. 2840-2857 |
artikel |
20 |
An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain
|
Li, Yuxi |
|
|
14 |
5 |
p. 2826-2839 |
artikel |
21 |
A robust and lightweight secure access scheme for cloud based E-healthcare services
|
Masud, Mehedi |
|
|
14 |
5 |
p. 3043-3057 |
artikel |
22 |
A survey for the application of blockchain technology in the media
|
Liu, Liqun |
|
|
14 |
5 |
p. 3143-3165 |
artikel |
23 |
A two-level traffic smoothing method for efficient cloud–IoT communications
|
Tolba, Amr |
|
|
14 |
5 |
p. 2743-2756 |
artikel |
24 |
BacS: A blockchain-based access control scheme in distributed internet of things
|
Shi, Na |
|
|
14 |
5 |
p. 2585-2599 |
artikel |
25 |
Blockchain–a promising solution to internet of things: A comprehensive analysis, opportunities, challenges and future research issues
|
Paul, Anup Kumar |
|
|
14 |
5 |
p. 2926-2951 |
artikel |
26 |
Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks
|
Reebadiya, Dakshita |
|
|
14 |
5 |
p. 2757-2774 |
artikel |
27 |
Blockchain smart contracts: Applications, challenges, and future trends
|
Khan, Shafaq Naheed |
|
|
14 |
5 |
p. 2901-2925 |
artikel |
28 |
Cognitive IoT relaying NOMA networks with user clustering and imperfect SIC
|
Le, Anh-Tu |
|
|
14 |
5 |
p. 3170-3180 |
artikel |
29 |
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts
|
Jain, Vibha |
|
|
14 |
5 |
p. 3124-3142 |
artikel |
30 |
Cooperative content offloading scheme in air-ocean integrated networks
|
Zhou, Junjie |
|
|
14 |
5 |
p. 3388-3404 |
artikel |
31 |
Data analytics and the P2P cloud: an integrated model for strategy formulation based on customer behaviour
|
Lam, H. Y. |
|
|
14 |
5 |
p. 2600-2617 |
artikel |
32 |
Data-driven peer-to-peer blockchain framework for water consumption management
|
Li, Huimin |
|
|
14 |
5 |
p. 2887-2900 |
artikel |
33 |
Deep learning application for sensing available spectrum for cognitive radio: An ECRNN approach
|
Goyal, S. B. |
|
|
14 |
5 |
p. 3235-3249 |
artikel |
34 |
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments
|
Huertas Celdrán, Alberto |
|
|
14 |
5 |
p. 2719-2734 |
artikel |
35 |
Downlink aware data scheduling with delay guarantees in resource-limited leo satellite networks
|
Wan, Ying |
|
|
14 |
5 |
p. 3291-3306 |
artikel |
36 |
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities
|
Chiu, Wei-Yang |
|
|
14 |
5 |
p. 2874-2886 |
artikel |
37 |
Effective peer-to-peer routing in heterogeneous half-duplex and full-duplex multi-hop cognitive radio networks
|
Salameh, Haythem Bany |
|
|
14 |
5 |
p. 3225-3234 |
artikel |
38 |
Energy efficiency maximization for beyond 5G NOMA-enabled heterogeneous networks
|
Khan, Wali Ullah |
|
|
14 |
5 |
p. 3250-3264 |
artikel |
39 |
Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems
|
Budati, Anil Kumar |
|
|
14 |
5 |
p. 3166-3169 |
artikel |
40 |
HonestChain: Consortium blockchain for protected data sharing in health information systems
|
Purohit, Soumya |
|
|
14 |
5 |
p. 3012-3028 |
artikel |
41 |
Joint association and power optimization for multi-UAV assisted cooperative transmission in marine IoT networks
|
Lyu, Ling |
|
|
14 |
5 |
p. 3307-3318 |
artikel |
42 |
Optimal cooperative spectrum sensing for 5G cognitive networks using evolutionary algorithms
|
Gupta, Vivek |
|
|
14 |
5 |
p. 3213-3224 |
artikel |
43 |
Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks
|
Khalaf, Osamah Ibrahim |
|
|
14 |
5 |
p. 2858-2873 |
artikel |
44 |
Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G
|
Kamboh, Usman Rauf |
|
|
14 |
5 |
p. 3181-3197 |
artikel |
45 |
Penetration testing framework for smart contract Blockchain
|
Bhardwaj, Akashdeep |
|
|
14 |
5 |
p. 2635-2650 |
artikel |
46 |
Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain
|
Banupriya, S. |
|
|
14 |
5 |
p. 2813-2825 |
artikel |
47 |
Resource management of GEO relays for real-time remote sensing
|
Xu, Xiaobin |
|
|
14 |
5 |
p. 3333-3348 |
artikel |
48 |
RETRACTED ARTICLE: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties
|
Liu, Zhijiang |
|
|
14 |
5 |
p. 2618-2625 |
artikel |
49 |
RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain
|
Kumar, Ajay |
|
|
14 |
5 |
p. 3058-3074 |
artikel |
50 |
Secure and efficient mutual authentication protocol for smart grid under blockchain
|
Wang, Weizheng |
|
|
14 |
5 |
p. 2681-2693 |
artikel |
51 |
Space-air-ground integrated networks for future IoT: Architecture, management, service and performance
|
Lyu, Feng |
|
|
14 |
5 |
p. 3265-3267 |
artikel |
52 |
The impact of propagation delay to different selfish miners in proof-of-work blockchains
|
Wang, Heli |
|
|
14 |
5 |
p. 2735-2742 |
artikel |
53 |
Trust and scalable blockchain-based message exchanging scheme on VANET
|
Chukwuocha, Chukwuka |
|
|
14 |
5 |
p. 3092-3109 |
artikel |
54 |
Trust based task offloading scheme in UAV-enhanced edge computing network
|
Ouyang, Yan |
|
|
14 |
5 |
p. 3268-3290 |
artikel |
55 |
User authentication using Blockchain based smart contract in role-based access control
|
Kamboj, Priyanka |
|
|
14 |
5 |
p. 2961-2976 |
artikel |
56 |
Verifiable dynamic ranked search with forward privacy over encrypted cloud data
|
Chen, Chien-Ming |
|
|
14 |
5 |
p. 2977-2991 |
artikel |