Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             29 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain assisted multi-gateway authentication scheme for IIoT based on group Liu, Xin

16 1 p. 245-259
artikel
2 A blockchain-based framework for privacy-preserving and verifiable billing in smart grid Zhao, Meng

16 1 p. 142-155
artikel
3 Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization Ravi, Srivel

16 1 p. 22-34
artikel
4 An efficient route selection mechanism based on network topology in battery-powered internet of things networks Taami, Tania

16 1 p. 450-465
artikel
5 An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords Luo, Ming

16 1 p. 383-394
artikel
6 An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks Kranthi, S.

16 1 p. 210-225
artikel
7 A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain Yang, Xiaohui

16 1 p. 107-125
artikel
8 Backdoor attacks against deep reinforcement learning based traffic signal control systems Zhang, Heng

16 1 p. 466-474
artikel
9 Blockchain-Based Fair Payment for ABE with Outsourced Decryption Hong, Linjian

16 1 p. 312-327
artikel
10 Blockchain-based system for tracking and rewarding recyclable plastic waste Alnuaimi, Eiman

16 1 p. 328-346
artikel
11 CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic Mohseni, Milad

16 1 p. 189-209
artikel
12 Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things Lin, Lixia

16 1 p. 170-188
artikel
13 EEM-MAC: Enhanced energy efficient mobility aware MAC protocol for mobile internet of things Diniesh, V. C.

16 1 p. 87-106
artikel
14 Effective communication for message prioritization in DTN for disaster scenarios Rosas, Erika

16 1 p. 368-382
artikel
15 Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT Cai, Zhaoqi

16 1 p. 277-294
artikel
16 Field-clustering with sleep awake mechanism with fuzzy in wireless sensor network Tiwari, Poonam

16 1 p. 126-141
artikel
17 4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things Rangwani, Diksha

16 1 p. 35-56
artikel
18 MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm Li, Jinze

16 1 p. 226-244
artikel
19 Minimization of VANET execution time based on joint task offloading and resource allocation Wan, Neng

16 1 p. 71-86
artikel
20 MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime Gupta, Preeti

16 1 p. 347-357
artikel
21 Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem Tyagi, Gaurav

16 1 p. 260-276
artikel
22 Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving Wang, Yanfei

16 1 p. 295-311
artikel
23 Practical Byzantine fault tolerance consensus based on comprehensive reputation Qi, Jiamou

16 1 p. 420-430
artikel
24 Privacy-preserving and fault-tolerant aggregation of time-series data without TA Xu, Chang

16 1 p. 358-367
artikel
25 Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment Dwivedi, Sanjeev Kumar

16 1 p. 1-21
artikel
26 Supporting conflict-free replicated data types in opportunistic networks Guidec, Frédéric

16 1 p. 395-419
artikel
27 Tamper-proof multitenant data storage using blockchain Sharma, Aditi

16 1 p. 431-449
artikel
28 TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage Han, Mu

16 1 p. 156-169
artikel
29 Traffic simulation and losses estimation in stratospheric drone network Kharchenko, Volodymyr

16 1 p. 57-70
artikel
                             29 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland