nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A case study on the estimation of sensor data generation in smart cities and the role of opportunistic networks in sensor data collection
|
Gandhi, Jay |
|
|
17 |
1 |
p. 337-357 |
artikel |
2 |
A HSEERP—Hierarchical secured energy efficient routing protocol for wireless sensor networks
|
D, Udaya Suriya Rajkumar |
|
|
17 |
1 |
p. 163-175 |
artikel |
3 |
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system
|
Dong, Songshou |
|
|
17 |
1 |
p. 284-296 |
artikel |
4 |
An alliance chain-based incentive mechanism for PSG data sharing
|
Zhang, Wenbo |
|
|
17 |
1 |
p. 48-67 |
artikel |
5 |
A New Trust-Based Optimal Stochastic Data Scheduling for Wireless Sensor Networks
|
Komuraiah, Bejjam |
|
|
17 |
1 |
p. 176-199 |
artikel |
6 |
A novel transfer extreme learning machine from multiple sources for intrusion detection
|
Wang, Kunpeng |
|
|
17 |
1 |
p. 33-47 |
artikel |
7 |
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption
|
Luo, Ming |
|
|
17 |
1 |
p. 125-138 |
artikel |
8 |
A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
|
Paul, Rituparna |
|
|
17 |
1 |
p. 432-450 |
artikel |
9 |
A robust supervised machine learning based approach for offline-online traffic classification of software-defined networking
|
Eissa, Menas Ebrahim |
|
|
17 |
1 |
p. 479-506 |
artikel |
10 |
ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks
|
Simon, Judy |
|
|
17 |
1 |
p. 1-17 |
artikel |
11 |
A study on gas cost of ethereum smart contracts and performance of blockchain on simulation tool
|
Ta, Minh Thanh |
|
|
17 |
1 |
p. 200-212 |
artikel |
12 |
A truthful mechanism for multi-access multi-server multi-task resource allocation in mobile edge computing
|
Liu, Xi |
|
|
17 |
1 |
p. 532-548 |
artikel |
13 |
Attention mechanism based intelligent channel feedback for mmWave massive MIMO systems
|
Zhang, Yibin |
|
|
17 |
1 |
p. 261-283 |
artikel |
14 |
Attribute and closeness based scheduling model for vehicle-to-grid network
|
Zhang, Jing |
|
|
17 |
1 |
p. 213-226 |
artikel |
15 |
Author Correction to: A composite blockchain associated event traceability method for financial activities
|
Wang, Junlu |
|
|
17 |
1 |
p. 567-568 |
artikel |
16 |
Correction to: ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks
|
Simon, Judy |
|
|
17 |
1 |
p. 566 |
artikel |
17 |
Cryptanalysis of full round FUTURE with multiple biclique structures
|
Roy, Himadry Sekhar |
|
|
17 |
1 |
p. 397-409 |
artikel |
18 |
Demcrp-et: decentralized multi-criteria ranked prosumers energy trading using distributed ledger technology
|
Devi, N. Nandini |
|
|
17 |
1 |
p. 549-565 |
artikel |
19 |
Efficient algorithms for urban vehicular Ad Hoc networks quality based on average network flows
|
Wang, Haoxiang |
|
|
17 |
1 |
p. 115-124 |
artikel |
20 |
Efficient data harvesting from boundary nodes for smart irrigation
|
Jha, Sapna |
|
|
17 |
1 |
p. 139-162 |
artikel |
21 |
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
|
Benrebbouh, Chahrazed |
|
|
17 |
1 |
p. 68-88 |
artikel |
22 |
Improvement of energy-efficient resources for cognitive internet of things using learning automata
|
Rahmani, Parisa |
|
|
17 |
1 |
p. 297-320 |
artikel |
23 |
Joint power allocation and blocklength assignment for reliability optimization in CA-enabled HetNets
|
Yang, Leyou |
|
|
17 |
1 |
p. 358-372 |
artikel |
24 |
Lightweight secure authentication and key agreement technique for smart grid
|
Kumari, Disuja |
|
|
17 |
1 |
p. 451-478 |
artikel |
25 |
Lightweight two-factor authentication framework with privacy preserving for smart eHealth
|
Rao, Patruni Muralidhara |
|
|
17 |
1 |
p. 373-396 |
artikel |
26 |
Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection
|
Li, Fang |
|
|
17 |
1 |
p. 227-245 |
artikel |
27 |
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles
|
Rajasoundaran, S. |
|
|
17 |
1 |
p. 89-114 |
artikel |
28 |
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
|
Mahor, Vinod |
|
|
17 |
1 |
p. 321-336 |
artikel |
29 |
Semi-shadow file system: An anonymous files storage solution
|
Jiang, Xuhang |
|
|
17 |
1 |
p. 18-32 |
artikel |
30 |
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning
|
Liu, Yanjun |
|
|
17 |
1 |
p. 246-260 |
artikel |
31 |
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
|
Niktabe, Sepideh |
|
|
17 |
1 |
p. 507-531 |
artikel |
32 |
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
|
Seyedi, Zahra |
|
|
17 |
1 |
p. 410-431 |
artikel |