default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2020
- Junwei Liang, Maode Ma:
Design of Feature Selection Algorithm Based on MOEA for IDSs in VANETs. IECC 2020: 155-160 - Belal Abu-Naim, Martin Hronsky, Wolfgang Klas:
From Blockchain to Web: Paving the Last Mile for Releasing Chained Data from the Blocks. IECC 2020: 24-32 - Nada Alasbali, Saaidal Razalli Azzuhri, Rosli Salleh:
A Blockchain-Based Smart Network for IoT-Driven Smart Cities. IECC 2020: 17-23 - Ivan Chistiakov, Yury Yanovich:
Responsible Self-Funding in Dash Governance System. IECC 2020: 67-72 - I-Te Chou, Hung-Han Su, Yu-Ling Hsueh, Chih-Wen Hsueh:
BC-Store: A Scalable Design for Blockchain Storage. IECC 2020: 33-38 - Man Chun Chow, Maode Ma:
A Lightweight D2D Authentication Scheme against Free-riding Attacks in 5G Cellular Network. IECC 2020: 143-149 - Vyacheslav Davydov, Yury Yanovich:
Optimal Portfolio Sold-Out via Blockchain Tokenization. IECC 2020: 129-136 - Batnyam Enkhtaivan, Pooja Dhomse:
Proof of Data Distribution Based on Trusted Hardware. IECC 2020: 51-58 - Utkan Eryilmaz, Remco M. Dijkman, Willem van Jaarsveld, Wouter van Dis, Kaveh Alizadeh:
Traceability Blockchain Prototype for Regulated Manufacturing Industries. IECC 2020: 9-16 - Eric Gamess, Brody Smith:
Performance Evaluation of TCP and UDP over IPv4 and IPv6 for the ESP8266 Module. IECC 2020: 161-169 - Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu:
A Secure File Sharing System Based on IPFS and Blockchain. IECC 2020: 96-100 - Leila Ismail, Huned Materwala, Moien A. B. Khan:
Performance Evaluation of a Patient-Centric Blockchain-based Healthcare Records Management Framework. IECC 2020: 39-50 - Tae-Hoon Kim, Im-Yeong Lee:
Secure Hierarchical Deterministic Key Generation Scheme in Blockchain-based Medical Environment. IECC 2020: 108-114 - Haitao Liu:
A Novel Supply Chain Model Based on Smart Contract. IECC 2020: 115-120 - Mohamed Ikbal Nacer, Simant Prakoonwit, Ismail Alarab:
TheChain: A Fast, Secure and Parallel Treatment of Transactions. IECC 2020: 81-89 - Robert Norvill, Jean Hilger, Irfan Awan, Andrea J. Cullen, Radu State:
Decentralised Compliant Data Trading for Banks. IECC 2020: 121-128 - Natchanon Nuntanirund, Natawut Nupairoj:
High Performance Peer-to-peer Data Dissemination for Decentralized Wireless Sensor Networks Firmware Updating. IECC 2020: 137-142 - Alican Ozhelvaci, Maode Ma:
A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets. IECC 2020: 170-175 - Wolf Posdorfer, Heiko Bornholdt, Winfried Lamersdorf:
Transaction Dependency Model for Block Minimization in Arbitrary Blockchains. IECC 2020: 59-66 - Jens-Andreas Hanssen Rensaa, Danilo Gligoroski, Katina Kralevska, Anton Hasselgren, Arild Faxvaag:
VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept. IECC 2020: 73-80 - Hoon Shin, Kyuho Son, Dongsoo Han:
Sybil Tolerant Consensus Method Using Mutual Proof of Validation. IECC 2020: 1-8 - Rajendren Subramaniam, Saaidal Razalli Azzuhri, Teh Ying Wah:
Enhanced Security Approach Powered by Blockchain Technology with NFC to Prevent Fraudulence in Bank Letter of Credits. IECC 2020: 90-95 - Ke Wang, Yu Zhang, Elizabeth Chang:
A Conceptual Model for Blockchain-based Auditing Information System. IECC 2020: 101-107 - Anzhuo Xie, Dong Tan:
The Impact of Interaction on the Travel Arrangement: Cultivating Serendipity and Reducing Psychological Distance in Tourism Platforms. IECC 2020: 150-154 - IECC 2020: 2nd International Electronics Communication Conference, Singapore, July, 2020. ACM 2020, ISBN 978-1-4503-7770-6 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-24 00:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint