nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace
|
Su, Xin |
|
|
17 |
2 |
p. 739-755 |
artikel |
2 |
A Blockchain-based Privacy Protection Protocol using Smart Contracts in LEO satellite networks
|
Deng, Xia |
|
|
17 |
2 |
p. 800-818 |
artikel |
3 |
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET
|
Xie, Hui |
|
|
17 |
2 |
p. 569-584 |
artikel |
4 |
A low-cost blockchain node deployment algorithm for the internet of things
|
Lai, Xinyu |
|
|
17 |
2 |
p. 756-766 |
artikel |
5 |
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
|
G, Sahaya Stalin Jose |
|
|
17 |
2 |
p. 911-923 |
artikel |
6 |
Anonymous credentials for the internet of vehicles
|
Gong, Yi |
|
|
17 |
2 |
p. 871-880 |
artikel |
7 |
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks
|
Liu, Min |
|
|
17 |
2 |
p. 685-700 |
artikel |
8 |
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage
|
Liu, Xingchen |
|
|
17 |
2 |
p. 985-1000 |
artikel |
9 |
A website fingerprinting technology with time-sampling
|
Hong, Xueshu |
|
|
17 |
2 |
p. 944-960 |
artikel |
10 |
CIM: CP-ABE-based identity management framework for collaborative edge storage
|
Li, Chunjiao |
|
|
17 |
2 |
p. 639-655 |
artikel |
11 |
Design and implementation of anchor coprocessor architecture for wireless node localization applications
|
Biswas, Rathindra Nath |
|
|
17 |
2 |
p. 961-984 |
artikel |
12 |
DRIVE: Dual rider-remora optimization for vehicular routing
|
Kaur, Gurjot |
|
|
17 |
2 |
p. 834-857 |
artikel |
13 |
Extended chaotic map-based key management for hierarchical access control in e-medicine systems
|
Lee, Tian-Fu |
|
|
17 |
2 |
p. 858-870 |
artikel |
14 |
Flexible symmetric predicate encryption for data privacy in IoT environments
|
Bian, Qingquan |
|
|
17 |
2 |
p. 656-664 |
artikel |
15 |
Grouped federated learning for time-sensitive tasks in industrial IoTs
|
Hao, Jiangshan |
|
|
17 |
2 |
p. 819-833 |
artikel |
16 |
GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks
|
Dinesh, K. |
|
|
17 |
2 |
p. 585-611 |
artikel |
17 |
Heuristic-aided multi-objective function for satellite controller placement and routing in integrated satellite terrestrial network
|
Deepa, V. |
|
|
17 |
2 |
p. 767-783 |
artikel |
18 |
Hybrid optimized task scheduling with multi-objective framework for crowd sensing in mobile social networks
|
V, Sasireka |
|
|
17 |
2 |
p. 722-738 |
artikel |
19 |
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system
|
M, Anuradha |
|
|
17 |
2 |
p. 924-943 |
artikel |
20 |
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
|
Trivedi, Chandan |
|
|
17 |
2 |
p. 665-684 |
artikel |
21 |
Preserving location privacy against inference attacks in indoor positioning system
|
Hemkumar, D |
|
|
17 |
2 |
p. 784-799 |
artikel |
22 |
Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties
|
Liu, Zhijiang |
|
|
17 |
2 |
p. 1020 |
artikel |
23 |
SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning
|
Tang, Shijie |
|
|
17 |
2 |
p. 612-623 |
artikel |
24 |
Secret sharing based RFID protocol using ECC for TMIS
|
Ghosh, Haradhan |
|
|
17 |
2 |
p. 624-638 |
artikel |
25 |
SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network
|
Shukla, Anurag |
|
|
17 |
2 |
p. 701-721 |
artikel |
26 |
Socially-aware and privacy-preserving multi-objective worker recruitment in mobile crowd sensing
|
Fu, Yanming |
|
|
17 |
2 |
p. 1001-1019 |
artikel |
27 |
Tangent Pelican search optimization for block assignment in blockchain based IoT
|
Vinu, S. |
|
|
17 |
2 |
p. 881-895 |
artikel |
28 |
Towards driver distraction detection: a privacy-preserving federated learning approach
|
Zhou, Wenguang |
|
|
17 |
2 |
p. 896-910 |
artikel |