


default search action
Computer Communications, Volume 166
Volume 166, January 2021
- Ayman Ibaida

, Alsharif Abuadbba, Naveen K. Chilamkurti:
Privacy-preserving compression model for efficient IoMT ECG sharing. 1-8
- Leonardo Maccari

, Valeria Cagno
:
Do we need a contact tracing app? 9-18
- Prosanta Gope, Owen Millwood

, Neetesh Saxena
:
A provably secure authentication scheme for RFID-enabled UAV applications. 19-25
- Yunpei Chen, Qi Zhu, Chunyan Feng, Xiaohui Li

:
Analysis of backlog and delay in downlink power-domain non-orthogonal multiple access wireless networks. 26-39 - Dariusz Marek

, Adam Domanski
, Joanna Domanska
, Tadeusz Czachórski
, Jerzy Klamka
, Jakub Szygula
:
Combined diffusion approximation-simulation model of AQM's transient behavior. 40-48
- Zheng Wang, Guangfu Li, Jia Ren:

Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm. 49-56
- Zan Gao, Yuchan Yang, Mohammad Reza Khosravi, Shaohua Wan

:
Class consistent and joint group sparse representation model for image classification in Internet of Medical Things. 57-65
- Long Chen, Jigang Wu, Jun Zhang

:
Long-term optimization for MEC-enabled HetNets with device-edge-cloud collaboration. 66-80 - Zhixin Liu, Yongkang Wang, Yazhou Yuan, Kit Yan Chan:

Pricing-based interference management scheme in LTE-V2V communication with imperfect channel state information. 81-90
- Basudeb Bera

, Ashok Kumar Das
, Anil Kumar Sutrala
:
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment. 91-109
- Prabhat Kumar

, Govind P. Gupta
, Rakesh Tripathi:
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. 110-124
- Praveen Kumar Malik, Rohit Sharma

, Rajesh Singh
, Anita Gehlot
, Suresh Chandra Satapathy, Waleed S. Alnumay
, Danilo Pelusi, Uttam Ghosh
, Janmenjoy Nayak:
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art. 125-139
- K. Rajesh Rao

, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Role recommender-RBAC: Optimizing user-role assignments in RBAC. 140-153
- Pankaj Kumar, Lokesh Chouhan

:
A privacy and session key based authentication scheme for medical IoT networks. 154-164
- Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:

Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. 165-173
- Samuel Dayo Okegbile

, Bodhaswar T. Maharaj, Attahiru Sule Alfa:
Stochastic geometry approach towards interference management and control in cognitive radio network: A survey. 174-195 - Suat Mercan, Enes Erdin, Kemal Akkaya:

Improving transaction success rate in cryptocurrency payment channel networks. 196-207
- Gaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Wei (Lisa) Li:

Edge computing assisted privacy-preserving data computation for IoT devices. 208-215
- Lucas de Melo Guimarães, Jacir Luiz Bordim

:
A full-duplex MAC technique to improve spectrum-efficiency on 5G mobile wireless networks. 216-225
- Christian Grasso, Karthik Eswar K. N., Prabagarane Nagaradjane, Mridhula Ramesh

, Giovanni Schembra:
Designing the Tactile Support Engine to assist time-critical applications at the edge of a 5G network. 226-233
- Peng Feng

, Yuebin Bai, Yuhao Gu
, Jun Huang
, Xiaolin Wang, Chang Liu:
A rapid coarse-grained blind wideband spectrum sensing method for cognitive radio networks. 234-243 - Xiaohui Gu

, Guoan Zhang:
Energy-efficient computation offloading for vehicular edge computing networks. 244-253
- Xiaoheng Deng, Yajun Liu, Congxu Zhu, Honggang Zhang:

Air-Ground Surveillance Sensor Network based on edge computing for target tracking. 254-261 - Zhiping Jin

, Zhibiao Liang, Yu Wang
, Weizhi Meng
:
Mobile network traffic pattern classification with incomplete a priori information. 262-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














