nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bayesian-based distributed trust management scheme for connected vehicles’ security
|
Rawat, Gopal Singh |
|
|
16 |
5 |
p. 2290-2306 |
artikel |
2 |
A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records
|
Rani, P. Sheela |
|
|
16 |
5 |
p. 2456-2473 |
artikel |
3 |
A cluster reputation-based hierarchical consensus model in blockchain
|
Jiang, Yangyang |
|
|
16 |
5 |
p. 2591-2606 |
artikel |
4 |
ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network
|
Chaurasia, Soni |
|
|
16 |
5 |
p. 2186-2201 |
artikel |
5 |
A dynamic evaluation model of data price based on game theory
|
Bin, Zhao |
|
|
16 |
5 |
p. 2073-2088 |
artikel |
6 |
A mobile localization algorithm based on fuzzy estimation for serious NLOS scenes
|
Wang, Yan |
|
|
16 |
5 |
p. 2271-2289 |
artikel |
7 |
An efficient blockchain-based anonymous authentication and supervision system
|
Liang, Weiyou |
|
|
16 |
5 |
p. 2492-2511 |
artikel |
8 |
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model
|
Bushra, S. Nikkath |
|
|
16 |
5 |
p. 2307-2324 |
artikel |
9 |
A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN
|
Ambareesh, S. |
|
|
16 |
5 |
p. 2512-2524 |
artikel |
10 |
ASTPPO: A proximal policy optimization algorithm based on the attention mechanism and spatio–temporal correlation for routing optimization in software-defined networking
|
Chen, Junyan |
|
|
16 |
5 |
p. 2039-2057 |
artikel |
11 |
A verifiable and privacy-preserving blockchain-based federated learning approach
|
Ullah, Irshad |
|
|
16 |
5 |
p. 2256-2270 |
artikel |
12 |
Benefit-oriented task offloading in UAV-aided mobile edge computing: An approximate solution
|
Gao, Yu |
|
|
16 |
5 |
p. 2058-2072 |
artikel |
13 |
Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
|
Lou, Jhong-Ting |
|
|
16 |
5 |
p. 2415-2437 |
artikel |
14 |
Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption
|
Wu, Xiaohua |
|
|
16 |
5 |
p. 2649-2666 |
artikel |
15 |
B-Tor: Anonymous communication system based on consortium blockchain
|
Xu, Dawei |
|
|
16 |
5 |
p. 2218-2241 |
artikel |
16 |
Development of multi-objective cognitive radio network with energy harvesting for medical data transmission
|
Kumar, B Naresh |
|
|
16 |
5 |
p. 2131-2152 |
artikel |
17 |
Digital rights management scheme based on redactable blockchain and perceptual hash
|
Yi, Xinyu |
|
|
16 |
5 |
p. 2630-2648 |
artikel |
18 |
Enabling efficient and verifiable secure search on cloud-based encrypted big data
|
Du, Ruizhong |
|
|
16 |
5 |
p. 2574-2590 |
artikel |
19 |
Energy efficient fuzzy logic prediction-based opportunistic routing protocol (EEFLPOR) for wireless sensor networks
|
Nagadivya, S. |
|
|
16 |
5 |
p. 2089-2102 |
artikel |
20 |
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs
|
Madhavi, S. |
|
|
16 |
5 |
p. 2607-2629 |
artikel |
21 |
IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol
|
Deepavathi, P. |
|
|
16 |
5 |
p. 2380-2398 |
artikel |
22 |
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN
|
Duan, Yanyan |
|
|
16 |
5 |
p. 2202-2217 |
artikel |
23 |
Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis
|
Ho-Van, Khuong |
|
|
16 |
5 |
p. 2438-2455 |
artikel |
24 |
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks
|
Peng, Shuangrong |
|
|
16 |
5 |
p. 2474-2491 |
artikel |
25 |
Lightweight multi-departmental data sharing scheme based on consortium blockchain
|
Liu, Xueyan |
|
|
16 |
5 |
p. 2399-2414 |
artikel |
26 |
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
|
Nagarajan, Jay |
|
|
16 |
5 |
p. 2153-2185 |
artikel |
27 |
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications
|
Sudha, K. Swapna |
|
|
16 |
5 |
p. 2367-2379 |
artikel |
28 |
Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator
|
Yu, Xiaopeng |
|
|
16 |
5 |
p. 2242-2255 |
artikel |
29 |
Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain
|
Raghav, |
|
|
16 |
5 |
p. 2525-2547 |
artikel |
30 |
Quantum secure two party authentication protocol for mobile devices
|
Moony, Bshisht |
|
|
16 |
5 |
p. 2548-2559 |
artikel |
31 |
RIS-assisted device-edge collaborative edge computing for industrial applications
|
Guo, Mian |
|
|
16 |
5 |
p. 2023-2038 |
artikel |
32 |
Robust cooperative localization using peer-to-peer ranging measurements
|
Jiang, Peiyue |
|
|
16 |
5 |
p. 2103-2112 |
artikel |
33 |
SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs
|
Kaddoura, Sanaa |
|
|
16 |
5 |
p. 2325-2348 |
artikel |
34 |
Swarm learning based credit scoring for P2P lending in block chain
|
John, Antony Prince |
|
|
16 |
5 |
p. 2113-2130 |
artikel |
35 |
Task scheduling based on minimization of makespan and energy consumption using binary GWO algorithm in cloud environment
|
Natesan, Gobalakrishnan |
|
|
16 |
5 |
p. 2560-2573 |
artikel |
36 |
Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
|
Zhang, Xiaohong |
|
|
16 |
5 |
p. 2349-2366 |
artikel |