Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             47 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network Payattukalanirappel, Sharon Justine

17 6 p. 4013-4032
artikel
2 A delay aware routing approach for FANET based on emperor penguins colony algorithm Sadrishojaei, Mahyar

17 6 p. 3542-3555
artikel
3 A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS Majhi, Babita

17 6 p. 3556-3570
artikel
4 A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks Lyu, Zengwei

17 6 p. 3507-3525
artikel
5 A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive Chenam, Venkata Bhikshapathi

17 6 p. 3526-3541
artikel
6 A multi-user mobile edge computing task offloading and trajectory management based on proximal policy optimization Ma, Bo

17 6 p. 4210-4229
artikel
7 An efficient energy supply policy and optimized self-adaptive data aggregation with deep learning in heterogeneous wireless sensor network Tharmalingam, Rajkumar

17 6 p. 3991-4012
artikel
8 An energy efficient access control for secured intelligent transportation system for 6G networking in VANET Pulligilla, Manoj Kumar

17 6 p. 3618-3633
artikel
9 An ensemble learning approach for intrusion detection in IoT-based smart cities Indra, G.

17 6 p. 4230-4246
artikel
10 A secure and trusted consensus protocol for blockchain-enabled supply chain management system Manjula, Rangu

17 6 p. 3815-3840
artikel
11 A traffic flow prediction framework based on integrated federated learning and Recurrent Long short-term networks Pulligilla, Manoj Kumar

17 6 p. 4131-4155
artikel
12 BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records Patruni, Muralidhara Rao

17 6 p. 4175-4196
artikel
13 Blockchain abetted energy efficient archerfish hunting and Namib Beetle optimization algorithm espoused clustering protocol for wireless sensor network S, Kiran W.

17 6 p. 3934-3947
artikel
14 Blockchain-based intelligent tracing of food grain crops from production to delivery Agarwal, Udit

17 6 p. 3722-3749
artikel
15 Blockchain technology for secure electronic healthcare record in cloud based cryptographic hash generator Mubarakali, Azath

17 6 p. 4286-4302
artikel
16 BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing Yang, Xiaohui

17 6 p. 4033-4048
artikel
17 Cloud guard: Optimizing intrusion detection for fortifying privacy defenses with an optimized self adaptive physics-informed neural network Alotaibi, Nouf Saeed

17 6 p. 4378-4394
artikel
18 Correction to: Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution Vellingiri, J.

17 6 p. 4396
artikel
19 Correction to: Minimization of VANET execution time based on joint task offloading and resource allocation Wan, Neng

17 6 p. 4395
artikel
20 CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF He, Yueyue

17 6 p. 3669-3687
artikel
21 D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks Tian, Xianzhong

17 6 p. 3765-3779
artikel
22 Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm Zhu, Jueyu

17 6 p. 3571-3582
artikel
23 Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks Yi, Ming

17 6 p. 3650-3668
artikel
24 DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning Zhang, Guozhi

17 6 p. 3750-3764
artikel
25 EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens Rani, Prity

17 6 p. 3583-3602
artikel
26 End to end delay aware service function chain scheduling in network function virtualization enabled networks Dubba, Sudha

17 6 p. 3883-3904
artikel
27 Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach Saini, Himani

17 6 p. 4084-4109
artikel
28 Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication Al-Mekhlafi, Zeyad Ghaleb

17 6 p. 3703-3721
artikel
29 Homomorphic multi-party computation for Internet of Medical Things Hosseingholizadeh, Amin

17 6 p. 4049-4069
artikel
30 In-depth analysis of fault tolerant approaches integrated with load balancing and task scheduling Mushtaq, Sheikh Umar

17 6 p. 4303-4337
artikel
31 Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes Alserhani, Faeiz M.

17 6 p. 3856-3882
artikel
32 IoV block secure: blockchain based secure data collection and validation framework for internet of vehicles network G, Madhukar

17 6 p. 3964-3990
artikel
33 Mainstay: A hybrid protocol ensuring ledger temporality and security Liu, Liangxin

17 6 p. 3948-3963
artikel
34 MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks Singh, Yogita

17 6 p. 3688-3702
artikel
35 Multiobjective Gannet Dung Beetle Optimization for routing in IoT-WSN Sangeetha, S.

17 6 p. 4357-4377
artikel
36 Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database Wu, Wei

17 6 p. 4156-4174
artikel
37 REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security Kumar, C Madan

17 6 p. 4264-4285
artikel
38 SCMABC Algorithm-based routing for secure and efficient data transmission in smart grid AMI networks Beula, G. Starlin

17 6 p. 4110-4130
artikel
39 Secure and lightweight key agreement protocol for remote surgery over tactile internet using physically unclonable functions Lee, Tian-Fu

17 6 p. 4247-4263
artikel
40 Secure electronic medical records sharing scheme based on blockchain by using proxy re-encryption Zhou, Hanlin

17 6 p. 4197-4209
artikel
41 Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action Reshi, Iraq Ahmad

17 6 p. 3905-3933
artikel
42 Security analysis and trends in signcryption for WBAN: A research study K, Divya Keerthana

17 6 p. 3780-3814
artikel
43 SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems Qasem, Abdelaziz Alshaikh

17 6 p. 3634-3649
artikel
44 SusChain: a sustainable sharding scheme for UAV blockchain networks Chen, Jiale

17 6 p. 3603-3617
artikel
45 Temporal and spatial data redundancy reduction using machine learning approach for IoT based heterogeneous wireless sensor networks R, Blessina Preethi

17 6 p. 4338-4356
artikel
46 Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks Zhang, Fanlong

17 6 p. 4070-4083
artikel
47 Transaction graph based key node identification for blockchain regulation Hu, Yiren

17 6 p. 3841-3855
artikel
                             47 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland