Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A bayesian-based distributed trust management scheme for connected vehicles’ security Rawat, Gopal Singh

16 5 p. 2290-2306
artikel
2 A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records Rani, P. Sheela

16 5 p. 2456-2473
artikel
3 A cluster reputation-based hierarchical consensus model in blockchain Jiang, Yangyang

16 5 p. 2591-2606
artikel
4 ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network Chaurasia, Soni

16 5 p. 2186-2201
artikel
5 A dynamic evaluation model of data price based on game theory Bin, Zhao

16 5 p. 2073-2088
artikel
6 A mobile localization algorithm based on fuzzy estimation for serious NLOS scenes Wang, Yan

16 5 p. 2271-2289
artikel
7 An efficient blockchain-based anonymous authentication and supervision system Liang, Weiyou

16 5 p. 2492-2511
artikel
8 An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model Bushra, S. Nikkath

16 5 p. 2307-2324
artikel
9 A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN Ambareesh, S.

16 5 p. 2512-2524
artikel
10 ASTPPO: A proximal policy optimization algorithm based on the attention mechanism and spatio–temporal correlation for routing optimization in software-defined networking Chen, Junyan

16 5 p. 2039-2057
artikel
11 A verifiable and privacy-preserving blockchain-based federated learning approach Ullah, Irshad

16 5 p. 2256-2270
artikel
12 Benefit-oriented task offloading in UAV-aided mobile edge computing: An approximate solution Gao, Yu

16 5 p. 2058-2072
artikel
13 Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system Lou, Jhong-Ting

16 5 p. 2415-2437
artikel
14 Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption Wu, Xiaohua

16 5 p. 2649-2666
artikel
15 B-Tor: Anonymous communication system based on consortium blockchain Xu, Dawei

16 5 p. 2218-2241
artikel
16 Development of multi-objective cognitive radio network with energy harvesting for medical data transmission Kumar, B Naresh

16 5 p. 2131-2152
artikel
17 Digital rights management scheme based on redactable blockchain and perceptual hash Yi, Xinyu

16 5 p. 2630-2648
artikel
18 Enabling efficient and verifiable secure search on cloud-based encrypted big data Du, Ruizhong

16 5 p. 2574-2590
artikel
19 Energy efficient fuzzy logic prediction-based opportunistic routing protocol (EEFLPOR) for wireless sensor networks Nagadivya, S.

16 5 p. 2089-2102
artikel
20 Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs Madhavi, S.

16 5 p. 2607-2629
artikel
21 IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol Deepavathi, P.

16 5 p. 2380-2398
artikel
22 Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN Duan, Yanyan

16 5 p. 2202-2217
artikel
23 Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis Ho-Van, Khuong

16 5 p. 2438-2455
artikel
24 LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks Peng, Shuangrong

16 5 p. 2474-2491
artikel
25 Lightweight multi-departmental data sharing scheme based on consortium blockchain Liu, Xueyan

16 5 p. 2399-2414
artikel
26 Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey Nagarajan, Jay

16 5 p. 2153-2185
artikel
27 Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications Sudha, K. Swapna

16 5 p. 2367-2379
artikel
28 Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator Yu, Xiaopeng

16 5 p. 2242-2255
artikel
29 Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain Raghav,

16 5 p. 2525-2547
artikel
30 Quantum secure two party authentication protocol for mobile devices Moony, Bshisht

16 5 p. 2548-2559
artikel
31 RIS-assisted device-edge collaborative edge computing for industrial applications Guo, Mian

16 5 p. 2023-2038
artikel
32 Robust cooperative localization using peer-to-peer ranging measurements Jiang, Peiyue

16 5 p. 2103-2112
artikel
33 SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs Kaddoura, Sanaa

16 5 p. 2325-2348
artikel
34 Swarm learning based credit scoring for P2P lending in block chain John, Antony Prince

16 5 p. 2113-2130
artikel
35 Task scheduling based on minimization of makespan and energy consumption using binary GWO algorithm in cloud environment Natesan, Gobalakrishnan

16 5 p. 2560-2573
artikel
36 Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs Zhang, Xiaohong

16 5 p. 2349-2366
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland