nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain assisted multi-gateway authentication scheme for IIoT based on group
|
Liu, Xin |
|
|
16 |
1 |
p. 245-259 |
artikel |
2 |
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid
|
Zhao, Meng |
|
|
16 |
1 |
p. 142-155 |
artikel |
3 |
Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization
|
Ravi, Srivel |
|
|
16 |
1 |
p. 22-34 |
artikel |
4 |
An efficient route selection mechanism based on network topology in battery-powered internet of things networks
|
Taami, Tania |
|
|
16 |
1 |
p. 450-465 |
artikel |
5 |
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords
|
Luo, Ming |
|
|
16 |
1 |
p. 383-394 |
artikel |
6 |
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks
|
Kranthi, S. |
|
|
16 |
1 |
p. 210-225 |
artikel |
7 |
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain
|
Yang, Xiaohui |
|
|
16 |
1 |
p. 107-125 |
artikel |
8 |
Backdoor attacks against deep reinforcement learning based traffic signal control systems
|
Zhang, Heng |
|
|
16 |
1 |
p. 466-474 |
artikel |
9 |
Blockchain-Based Fair Payment for ABE with Outsourced Decryption
|
Hong, Linjian |
|
|
16 |
1 |
p. 312-327 |
artikel |
10 |
Blockchain-based system for tracking and rewarding recyclable plastic waste
|
Alnuaimi, Eiman |
|
|
16 |
1 |
p. 328-346 |
artikel |
11 |
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic
|
Mohseni, Milad |
|
|
16 |
1 |
p. 189-209 |
artikel |
12 |
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things
|
Lin, Lixia |
|
|
16 |
1 |
p. 170-188 |
artikel |
13 |
EEM-MAC: Enhanced energy efficient mobility aware MAC protocol for mobile internet of things
|
Diniesh, V. C. |
|
|
16 |
1 |
p. 87-106 |
artikel |
14 |
Effective communication for message prioritization in DTN for disaster scenarios
|
Rosas, Erika |
|
|
16 |
1 |
p. 368-382 |
artikel |
15 |
Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT
|
Cai, Zhaoqi |
|
|
16 |
1 |
p. 277-294 |
artikel |
16 |
Field-clustering with sleep awake mechanism with fuzzy in wireless sensor network
|
Tiwari, Poonam |
|
|
16 |
1 |
p. 126-141 |
artikel |
17 |
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things
|
Rangwani, Diksha |
|
|
16 |
1 |
p. 35-56 |
artikel |
18 |
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm
|
Li, Jinze |
|
|
16 |
1 |
p. 226-244 |
artikel |
19 |
Minimization of VANET execution time based on joint task offloading and resource allocation
|
Wan, Neng |
|
|
16 |
1 |
p. 71-86 |
artikel |
20 |
MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime
|
Gupta, Preeti |
|
|
16 |
1 |
p. 347-357 |
artikel |
21 |
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
|
Tyagi, Gaurav |
|
|
16 |
1 |
p. 260-276 |
artikel |
22 |
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving
|
Wang, Yanfei |
|
|
16 |
1 |
p. 295-311 |
artikel |
23 |
Practical Byzantine fault tolerance consensus based on comprehensive reputation
|
Qi, Jiamou |
|
|
16 |
1 |
p. 420-430 |
artikel |
24 |
Privacy-preserving and fault-tolerant aggregation of time-series data without TA
|
Xu, Chang |
|
|
16 |
1 |
p. 358-367 |
artikel |
25 |
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment
|
Dwivedi, Sanjeev Kumar |
|
|
16 |
1 |
p. 1-21 |
artikel |
26 |
Supporting conflict-free replicated data types in opportunistic networks
|
Guidec, Frédéric |
|
|
16 |
1 |
p. 395-419 |
artikel |
27 |
Tamper-proof multitenant data storage using blockchain
|
Sharma, Aditi |
|
|
16 |
1 |
p. 431-449 |
artikel |
28 |
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
|
Han, Mu |
|
|
16 |
1 |
p. 156-169 |
artikel |
29 |
Traffic simulation and losses estimation in stratospheric drone network
|
Kharchenko, Volodymyr |
|
|
16 |
1 |
p. 57-70 |
artikel |