Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             48 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based auditable deduplication scheme for multi-cloud storage Jin, Chunhua

17 5 p. 2870-2883
artikel
2 A blockchain-based privacy protecting framework with multi-channel access control model for asset trading Cai, Jing

17 5 p. 2810-2829
artikel
3 A comprehensive survey on optimization techniques for efficient cluster based routing in WSN Karpurasundharapondian, P.

17 5 p. 3080-3093
artikel
4 Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection Kaliappan, Chandra Prabha

17 5 p. 2737-2757
artikel
5 Advancing security and efficiency in MANET using dynamic algorithm switching Anand, M. Vijay

17 5 p. 2796-2809
artikel
6 A hierarchical hybrid intrusion detection model for industrial internet of things Wang, Zhendong

17 5 p. 3385-3407
artikel
7 A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks Kalpana, Dingari

17 5 p. 2758-2780
artikel
8 An IMOA DV-Hop localization algorithm in WSN based on hop count and hop distance correction Yu, Xiuwu

17 5 p. 2637-2650
artikel
9 An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system Nandhini, U

17 5 p. 2944-2978
artikel
10 An integrated MCDM-based charging scheduling in a WRSN with multiple MCs Ri, Man Gun

17 5 p. 3286-3303
artikel
11 An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking Rao, Ashutosh Kumar

17 5 p. 3159-3181
artikel
12 A secure location management scheme in an LEO-satellite network with dual-mobility Kong, Qinglei

17 5 p. 3146-3158
artikel
13 A secure user authentication scheme for crypto-wallet in IoT environment Truong, Toan-Thinh

17 5 p. 3025-3048
artikel
14 A smart contract vulnerability detection method based on deep learning with opcode sequences Li, Peiqiang

17 5 p. 3222-3238
artikel
15 Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals Liu, Chunyan

17 5 p. 3445-3458
artikel
16 BranchFusionNet: An energy-efficient lightweight framework for superior retinal vessel segmentation Qin, Jing

17 5 p. 3133-3145
artikel
17 Cluster based hybrid flamingo hazelnut tree with improved marine predators for fault tolerant energy efficient routing in wireless sensor network Nandal, Vijay

17 5 p. 2998-3024
artikel
18 Consortium blockchain based secure and efficient data aggregation and dynamic billing system in smart grid Oksuz, Ozgur

17 5 p. 2717-2736
artikel
19 Correction to: Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs) Radhakrishnan, Pradeep

17 5 p. 3505
artikel
20 Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs Kumar, Kammula Sunil

17 5 p. 3335-3352
artikel
21 Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach Shiny, S.

17 5 p. 3424-3444
artikel
22 Efficient non-interactive zero-knowledge proofs for quantum range verification in blockchain Sriman, B.

17 5 p. 2661-2674
artikel
23 Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN Rajkumar, K

17 5 p. 3408-3423
artikel
24 Enhancing paillier to fully homomorphic encryption with semi-honest TEE Fang, Yunyi

17 5 p. 3476-3488
artikel
25 Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection Kim, Tae hoon

17 5 p. 3369-3384
artikel
26 Feature fusion federated learning for privacy-aware indoor localization Tasbaz, Omid

17 5 p. 2781-2795
artikel
27 Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme Kaur, Rupinder

17 5 p. 3353-3368
artikel
28 Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution Vellingiri, J.

17 5 p. 2979-2997
artikel
29 HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks Dinesh, K.

17 5 p. 2609-2636
artikel
30 Hybrid cat and mouse-based dolphin swarm optimization strategy for intelligent routing in wireless sensor network applicable for iot applications Naveen, G.

17 5 p. 2692-2716
artikel
31 Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN Das, Nabanita

17 5 p. 3239-3254
artikel
32 IoT in energy: a comprehensive review of technologies, applications, and future directions Arshi, Oroos

17 5 p. 2830-2869
artikel
33 LSF-IDM: Deep learning-based lightweight semantic fusion intrusion detection model for automotive Cheng, Pengzhou

17 5 p. 2884-2905
artikel
34 MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs Tyagi, Vikas

17 5 p. 3314-3334
artikel
35 Online budget-limited pricing incentives for remote mobile sensing Sun, Jiajun

17 5 p. 3304-3313
artikel
36 Optimization of edge server group collaboration architecture strategy in IoT smart cities application Gou, Fangfang

17 5 p. 3110-3132
artikel
37 PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks Jayashree, S.

17 5 p. 3049-3079
artikel
38 Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine Wu, Runze

17 5 p. 3094-3109
artikel
39 Proxy re-signature scheme with cryptographic reverse firewall for medical data security Yang, Xiaodong

17 5 p. 3459-3475
artikel
40 RAB: A lightweight block cipher algorithm with variable key length Zhang, Xing

17 5 p. 2906-2920
artikel
41 Resilient enhancements of routing protocols in MANET Baumgartner, Maros

17 5 p. 3200-3221
artikel
42 Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network Renu, Yuvaraj

17 5 p. 3269-3285
artikel
43 Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid Zhang, Kai

17 5 p. 3255-3268
artikel
44 Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM Ramesh Kumar, M.

17 5 p. 2921-2943
artikel
45 SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework Ramya, S.

17 5 p. 2675-2691
artikel
46 Small target disease detection based on YOLOv5 framework for intelligent bridges Zhang, Tingping

17 5 p. 2651-2660
artikel
47 Temporary relay: A more flexible way to cross chains Wang, Haonan

17 5 p. 3489-3504
artikel
48 Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption Xu, Wenju

17 5 p. 3182-3199
artikel
                             48 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland