nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis of bitcoin backbone protocol in the non-flat model
|
Ni, Peifang |
|
|
63 |
3 |
|
artikel |
2 |
Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
|
Yuan, Quan |
|
|
63 |
3 |
|
artikel |
3 |
An eigenvalue-based immunization scheme for node attacks in networks with uncertainty
|
Ren, Yizhi |
|
|
63 |
3 |
|
artikel |
4 |
An enhanced searchable encryption scheme for secure data outsourcing
|
Zhang, Rui |
|
|
63 |
3 |
|
artikel |
5 |
An improved Durandal signature scheme
|
Song, Yongcheng |
|
|
63 |
3 |
|
artikel |
6 |
An improved PAAs countermeasure based on permutation tables and latch PUF
|
Li, Bing |
|
|
63 |
3 |
|
artikel |
7 |
A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
|
Zhou, Lu |
|
|
63 |
3 |
|
artikel |
8 |
Blockchain-based multiple groups data sharing with anonymity and traceability
|
Huang, Hui |
|
2019 |
63 |
3 |
p. 1-13 |
artikel |
9 |
Characterizing differential support of vectorial Boolean functions using the Walsh transform
|
Peng, Jie |
|
|
63 |
3 |
|
artikel |
10 |
Ciphertext-only fault analysis on the Midori lightweight cryptosystem
|
Li, Wei |
|
|
63 |
3 |
|
artikel |
11 |
Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography
|
Yeom, Yongjin |
|
|
63 |
3 |
|
artikel |
12 |
General construction of revocable identity-based fully homomorphic signature
|
Xie, Congge |
|
|
63 |
3 |
|
artikel |
13 |
Global Mittag-Leffler stability for fractional-order coupled systems on network without strong connectedness
|
Meng, Xin |
|
|
63 |
3 |
|
artikel |
14 |
Hybrid malware detection approach with feedback-directed machine learning
|
Li, Zhetao |
|
|
63 |
3 |
|
artikel |
15 |
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
|
Zheng, Baokun |
|
|
63 |
3 |
|
artikel |
16 |
Image processing operations identification via convolutional neural network
|
Chen, Bolin |
|
|
63 |
3 |
|
artikel |
17 |
Improved distinguisher search techniques based on parity sets
|
Xie, Xiaofeng |
|
|
63 |
3 |
|
artikel |
18 |
Integral Barrier Lyapunov function-based adaptive control for switched nonlinear systems
|
Liu, Lei |
|
|
63 |
3 |
|
artikel |
19 |
Observer-based adaptive consensus control for nonlinear multi-agent systems with time-delay
|
Xiao, Wenbin |
|
|
63 |
3 |
|
artikel |
20 |
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
|
Xu, Chang |
|
|
63 |
3 |
|
artikel |
21 |
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
|
Lin, Chao |
|
|
63 |
3 |
|
artikel |
22 |
Space efficient revocable IBE for mobile devices in cloud computing
|
Qin, Baodong |
|
|
63 |
3 |
|
artikel |
23 |
Special focus on security and privacy in blockchain-based applications
|
Zhong, Sheng |
|
|
63 |
3 |
|
artikel |
24 |
Static tainting extraction approach based on information flow graph for personally identifiable information
|
Liu, Yi |
|
|
63 |
3 |
|
artikel |
25 |
Stream cipher designs: a review
|
Jiao, Lin |
|
|
63 |
3 |
|
artikel |
26 |
Theoretical analysis of persistent fault attack
|
Zhang, Fan |
|
|
63 |
3 |
|
artikel |
27 |
Two-stage index-based central keyword-ranked searches over encrypted cloud data
|
Zhong, Hong |
|
|
63 |
3 |
|
artikel |