nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based auditable deduplication scheme for multi-cloud storage
|
Jin, Chunhua |
|
|
17 |
5 |
p. 2870-2883 |
artikel |
2 |
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading
|
Cai, Jing |
|
|
17 |
5 |
p. 2810-2829 |
artikel |
3 |
A comprehensive survey on optimization techniques for efficient cluster based routing in WSN
|
Karpurasundharapondian, P. |
|
|
17 |
5 |
p. 3080-3093 |
artikel |
4 |
Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
|
Kaliappan, Chandra Prabha |
|
|
17 |
5 |
p. 2737-2757 |
artikel |
5 |
Advancing security and efficiency in MANET using dynamic algorithm switching
|
Anand, M. Vijay |
|
|
17 |
5 |
p. 2796-2809 |
artikel |
6 |
A hierarchical hybrid intrusion detection model for industrial internet of things
|
Wang, Zhendong |
|
|
17 |
5 |
p. 3385-3407 |
artikel |
7 |
A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks
|
Kalpana, Dingari |
|
|
17 |
5 |
p. 2758-2780 |
artikel |
8 |
An IMOA DV-Hop localization algorithm in WSN based on hop count and hop distance correction
|
Yu, Xiuwu |
|
|
17 |
5 |
p. 2637-2650 |
artikel |
9 |
An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system
|
Nandhini, U |
|
|
17 |
5 |
p. 2944-2978 |
artikel |
10 |
An integrated MCDM-based charging scheduling in a WRSN with multiple MCs
|
Ri, Man Gun |
|
|
17 |
5 |
p. 3286-3303 |
artikel |
11 |
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking
|
Rao, Ashutosh Kumar |
|
|
17 |
5 |
p. 3159-3181 |
artikel |
12 |
A secure location management scheme in an LEO-satellite network with dual-mobility
|
Kong, Qinglei |
|
|
17 |
5 |
p. 3146-3158 |
artikel |
13 |
A secure user authentication scheme for crypto-wallet in IoT environment
|
Truong, Toan-Thinh |
|
|
17 |
5 |
p. 3025-3048 |
artikel |
14 |
A smart contract vulnerability detection method based on deep learning with opcode sequences
|
Li, Peiqiang |
|
|
17 |
5 |
p. 3222-3238 |
artikel |
15 |
Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals
|
Liu, Chunyan |
|
|
17 |
5 |
p. 3445-3458 |
artikel |
16 |
BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation
|
Qin, Jing |
|
|
17 |
5 |
p. 3133-3145 |
artikel |
17 |
Cluster based hybrid flamingo hazelnut tree with improved marine predators for fault tolerant energy efficient routing in wireless sensor network
|
Nandal, Vijay |
|
|
17 |
5 |
p. 2998-3024 |
artikel |
18 |
Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid
|
Oksuz, Ozgur |
|
|
17 |
5 |
p. 2717-2736 |
artikel |
19 |
Correction to: Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)
|
Radhakrishnan, Pradeep |
|
|
17 |
5 |
p. 3505 |
artikel |
20 |
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs
|
Kumar, Kammula Sunil |
|
|
17 |
5 |
p. 3335-3352 |
artikel |
21 |
Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach
|
Shiny, S. |
|
|
17 |
5 |
p. 3424-3444 |
artikel |
22 |
Efficient non-interactive zero-knowledge proofs for quantum range verification in blockchain
|
Sriman, B. |
|
|
17 |
5 |
p. 2661-2674 |
artikel |
23 |
Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN
|
Rajkumar, K |
|
|
17 |
5 |
p. 3408-3423 |
artikel |
24 |
Enhancing paillier to fully homomorphic encryption with semi-honest TEE
|
Fang, Yunyi |
|
|
17 |
5 |
p. 3476-3488 |
artikel |
25 |
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection
|
Kim, Tae hoon |
|
|
17 |
5 |
p. 3369-3384 |
artikel |
26 |
Feature fusion federated learning for privacy-aware indoor localization
|
Tasbaz, Omid |
|
|
17 |
5 |
p. 2781-2795 |
artikel |
27 |
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme
|
Kaur, Rupinder |
|
|
17 |
5 |
p. 3353-3368 |
artikel |
28 |
Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution
|
Vellingiri, J. |
|
|
17 |
5 |
p. 2979-2997 |
artikel |
29 |
HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks
|
Dinesh, K. |
|
|
17 |
5 |
p. 2609-2636 |
artikel |
30 |
Hybrid cat and mouse-based dolphin swarm optimization strategy for intelligent routing in wireless sensor network applicable for iot applications
|
Naveen, G. |
|
|
17 |
5 |
p. 2692-2716 |
artikel |
31 |
Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN
|
Das, Nabanita |
|
|
17 |
5 |
p. 3239-3254 |
artikel |
32 |
IoT in energy: a comprehensive review of technologies, applications, and future directions
|
Arshi, Oroos |
|
|
17 |
5 |
p. 2830-2869 |
artikel |
33 |
LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive
|
Cheng, Pengzhou |
|
|
17 |
5 |
p. 2884-2905 |
artikel |
34 |
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs
|
Tyagi, Vikas |
|
|
17 |
5 |
p. 3314-3334 |
artikel |
35 |
Online budget-limited pricing incentives for remote mobile sensing
|
Sun, Jiajun |
|
|
17 |
5 |
p. 3304-3313 |
artikel |
36 |
Optimization of edge server group collaboration architecture strategy in IoT smart cities application
|
Gou, Fangfang |
|
|
17 |
5 |
p. 3110-3132 |
artikel |
37 |
PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks
|
Jayashree, S. |
|
|
17 |
5 |
p. 3049-3079 |
artikel |
38 |
Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine
|
Wu, Runze |
|
|
17 |
5 |
p. 3094-3109 |
artikel |
39 |
Proxy re-signature scheme with cryptographic reverse firewall for medical data security
|
Yang, Xiaodong |
|
|
17 |
5 |
p. 3459-3475 |
artikel |
40 |
RAB: A lightweight block cipher algorithm with variable key length
|
Zhang, Xing |
|
|
17 |
5 |
p. 2906-2920 |
artikel |
41 |
Resilient enhancements of routing protocols in MANET
|
Baumgartner, Maros |
|
|
17 |
5 |
p. 3200-3221 |
artikel |
42 |
Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network
|
Renu, Yuvaraj |
|
|
17 |
5 |
p. 3269-3285 |
artikel |
43 |
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid
|
Zhang, Kai |
|
|
17 |
5 |
p. 3255-3268 |
artikel |
44 |
Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM
|
Ramesh Kumar, M. |
|
|
17 |
5 |
p. 2921-2943 |
artikel |
45 |
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework
|
Ramya, S. |
|
|
17 |
5 |
p. 2675-2691 |
artikel |
46 |
Small target disease detection based on YOLOv5 framework for intelligent bridges
|
Zhang, Tingping |
|
|
17 |
5 |
p. 2651-2660 |
artikel |
47 |
Temporary relay: A more flexible way to cross chains
|
Wang, Haonan |
|
|
17 |
5 |
p. 3489-3504 |
artikel |
48 |
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption
|
Xu, Wenju |
|
|
17 |
5 |
p. 3182-3199 |
artikel |