nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network
|
Payattukalanirappel, Sharon Justine |
|
|
17 |
6 |
p. 4013-4032 |
artikel |
2 |
A delay aware routing approach for FANET based on emperor penguins colony algorithm
|
Sadrishojaei, Mahyar |
|
|
17 |
6 |
p. 3542-3555 |
artikel |
3 |
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS
|
Majhi, Babita |
|
|
17 |
6 |
p. 3556-3570 |
artikel |
4 |
A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks
|
Lyu, Zengwei |
|
|
17 |
6 |
p. 3507-3525 |
artikel |
5 |
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive
|
Chenam, Venkata Bhikshapathi |
|
|
17 |
6 |
p. 3526-3541 |
artikel |
6 |
A multi-user mobile edge computing task offloading and trajectory management based on proximal policy optimization
|
Ma, Bo |
|
|
17 |
6 |
p. 4210-4229 |
artikel |
7 |
An efficient energy supply policy and optimized self-adaptive data aggregation with deep learning in heterogeneous wireless sensor network
|
Tharmalingam, Rajkumar |
|
|
17 |
6 |
p. 3991-4012 |
artikel |
8 |
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET
|
Pulligilla, Manoj Kumar |
|
|
17 |
6 |
p. 3618-3633 |
artikel |
9 |
An ensemble learning approach for intrusion detection in IoT-based smart cities
|
Indra, G. |
|
|
17 |
6 |
p. 4230-4246 |
artikel |
10 |
A secure and trusted consensus protocol for blockchain-enabled supply chain management system
|
Manjula, Rangu |
|
|
17 |
6 |
p. 3815-3840 |
artikel |
11 |
A traffic flow prediction framework based on integrated federated learning and Recurrent Long short-term networks
|
Pulligilla, Manoj Kumar |
|
|
17 |
6 |
p. 4131-4155 |
artikel |
12 |
BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records
|
Patruni, Muralidhara Rao |
|
|
17 |
6 |
p. 4175-4196 |
artikel |
13 |
Blockchain abetted energy efficient archerfish hunting and Namib Beetle optimization algorithm espoused clustering protocol for wireless sensor network
|
S, Kiran W. |
|
|
17 |
6 |
p. 3934-3947 |
artikel |
14 |
Blockchain-based intelligent tracing of food grain crops from production to delivery
|
Agarwal, Udit |
|
|
17 |
6 |
p. 3722-3749 |
artikel |
15 |
Blockchain technology for secure electronic healthcare record in cloud based cryptographic hash generator
|
Mubarakali, Azath |
|
|
17 |
6 |
p. 4286-4302 |
artikel |
16 |
BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing
|
Yang, Xiaohui |
|
|
17 |
6 |
p. 4033-4048 |
artikel |
17 |
Cloud guard: Optimizing intrusion detection for fortifying privacy defenses with an optimized self adaptive physics-informed neural network
|
Alotaibi, Nouf Saeed |
|
|
17 |
6 |
p. 4378-4394 |
artikel |
18 |
Correction to: Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution
|
Vellingiri, J. |
|
|
17 |
6 |
p. 4396 |
artikel |
19 |
Correction to: Minimization of VANET execution time based on joint task offloading and resource allocation
|
Wan, Neng |
|
|
17 |
6 |
p. 4395 |
artikel |
20 |
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF
|
He, Yueyue |
|
|
17 |
6 |
p. 3669-3687 |
artikel |
21 |
D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks
|
Tian, Xianzhong |
|
|
17 |
6 |
p. 3765-3779 |
artikel |
22 |
Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm
|
Zhu, Jueyu |
|
|
17 |
6 |
p. 3571-3582 |
artikel |
23 |
Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks
|
Yi, Ming |
|
|
17 |
6 |
p. 3650-3668 |
artikel |
24 |
DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning
|
Zhang, Guozhi |
|
|
17 |
6 |
p. 3750-3764 |
artikel |
25 |
EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens
|
Rani, Prity |
|
|
17 |
6 |
p. 3583-3602 |
artikel |
26 |
End to end delay aware service function chain scheduling in network function virtualization enabled networks
|
Dubba, Sudha |
|
|
17 |
6 |
p. 3883-3904 |
artikel |
27 |
Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach
|
Saini, Himani |
|
|
17 |
6 |
p. 4084-4109 |
artikel |
28 |
Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication
|
Al-Mekhlafi, Zeyad Ghaleb |
|
|
17 |
6 |
p. 3703-3721 |
artikel |
29 |
Homomorphic multi-party computation for Internet of Medical Things
|
Hosseingholizadeh, Amin |
|
|
17 |
6 |
p. 4049-4069 |
artikel |
30 |
In-depth analysis of fault tolerant approaches integrated with load balancing and task scheduling
|
Mushtaq, Sheikh Umar |
|
|
17 |
6 |
p. 4303-4337 |
artikel |
31 |
Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes
|
Alserhani, Faeiz M. |
|
|
17 |
6 |
p. 3856-3882 |
artikel |
32 |
IoV block secure: blockchain based secure data collection and validation framework for internet of vehicles network
|
G, Madhukar |
|
|
17 |
6 |
p. 3964-3990 |
artikel |
33 |
Mainstay: A hybrid protocol ensuring ledger temporality and security
|
Liu, Liangxin |
|
|
17 |
6 |
p. 3948-3963 |
artikel |
34 |
MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks
|
Singh, Yogita |
|
|
17 |
6 |
p. 3688-3702 |
artikel |
35 |
Multiobjective Gannet Dung Beetle Optimization for routing in IoT-WSN
|
Sangeetha, S. |
|
|
17 |
6 |
p. 4357-4377 |
artikel |
36 |
Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database
|
Wu, Wei |
|
|
17 |
6 |
p. 4156-4174 |
artikel |
37 |
REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security
|
Kumar, C Madan |
|
|
17 |
6 |
p. 4264-4285 |
artikel |
38 |
SCMABC Algorithm-based routing for secure and efficient data transmission in smart grid AMI networks
|
Beula, G. Starlin |
|
|
17 |
6 |
p. 4110-4130 |
artikel |
39 |
Secure and lightweight key agreement protocol for remote surgery over tactile internet using physically unclonable functions
|
Lee, Tian-Fu |
|
|
17 |
6 |
p. 4247-4263 |
artikel |
40 |
Secure electronic medical records sharing scheme based on blockchain by using proxy re-encryption
|
Zhou, Hanlin |
|
|
17 |
6 |
p. 4197-4209 |
artikel |
41 |
Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action
|
Reshi, Iraq Ahmad |
|
|
17 |
6 |
p. 3905-3933 |
artikel |
42 |
Security analysis and trends in signcryption for WBAN: A research study
|
K, Divya Keerthana |
|
|
17 |
6 |
p. 3780-3814 |
artikel |
43 |
SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems
|
Qasem, Abdelaziz Alshaikh |
|
|
17 |
6 |
p. 3634-3649 |
artikel |
44 |
SusChain: a sustainable sharding scheme for UAV blockchain networks
|
Chen, Jiale |
|
|
17 |
6 |
p. 3603-3617 |
artikel |
45 |
Temporal and spatial data redundancy reduction using machine learning approach for IoT based heterogeneous wireless sensor networks
|
R, Blessina Preethi |
|
|
17 |
6 |
p. 4338-4356 |
artikel |
46 |
Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks
|
Zhang, Fanlong |
|
|
17 |
6 |
p. 4070-4083 |
artikel |
47 |
Transaction graph based key node identification for blockchain regulation
|
Hu, Yiren |
|
|
17 |
6 |
p. 3841-3855 |
artikel |