nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A high performance two-layer consensus architecture for blockchain-based IoT systems
|
Qushtom, Haytham |
|
|
15 |
5 |
p. 2444-2456 |
artikel |
2 |
A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT
|
Kiran, Medikonda Asha |
|
|
15 |
5 |
p. 2390-2403 |
artikel |
3 |
A Mixed-integer programming model using particle swarm optimization algorithm for resource discovery in the cloudiot
|
Goudarzi, Parisa |
|
|
15 |
5 |
p. 2326-2346 |
artikel |
4 |
An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network
|
Sureshkumar, Venkatasamy |
|
|
15 |
5 |
p. 2347-2363 |
artikel |
5 |
A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model
|
Gopalakrishnan, B. |
|
|
15 |
5 |
p. 2199-2226 |
artikel |
6 |
A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs)
|
Jethava, Gordhan |
|
|
15 |
5 |
p. 2253-2269 |
artikel |
7 |
Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing
|
Yang, Xiaodong |
|
|
15 |
5 |
p. 2270-2288 |
artikel |
8 |
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network
|
Thirunavukkarasu, V. |
|
|
15 |
5 |
p. 2240-2252 |
artikel |
9 |
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics
|
Fan, Junchao |
|
|
15 |
5 |
p. 2376-2389 |
artikel |
10 |
Energy efficient clustering with compressive sensing for underwater wireless sensor networks
|
Bhaskarwar, Roshani V. |
|
|
15 |
5 |
p. 2289-2306 |
artikel |
11 |
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
|
Algubili, Bahaa Hussein Taher |
|
|
15 |
5 |
p. 2179-2198 |
artikel |
12 |
Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection
|
Moussa, Noureddine |
|
|
15 |
5 |
p. 2307-2325 |
artikel |
13 |
Managing communities in decentralised social environments
|
Guidi, Barbara |
|
|
15 |
5 |
p. 2404-2429 |
artikel |
14 |
Privacy-preserving “Check-in Award” Service in Location-based Social Networks
|
Hou, Hua |
|
|
15 |
5 |
p. 2364-2375 |
artikel |
15 |
Revisiting FAW attack in an imperfect PoW blockchain system
|
Zhu, Haoran |
|
|
15 |
5 |
p. 2430-2443 |
artikel |
16 |
Scale-free networks: evolutionary acceleration of the network survivability and its quantification
|
Yu, Anqi |
|
|
15 |
5 |
p. 2227-2239 |
artikel |
17 |
Service function path selection methods for multi-layer satellite networks
|
Li, Taixin |
|
|
15 |
5 |
p. 2161-2178 |
artikel |