


default search action
Computer Communications, Volume 218
Volume 218, 2024
- Mouna Rabhi

, Roberto Di Pietro
:
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure. 1-13 - David Franco

, Eder Ollora Zaballa
, Mingyuan Zang
, Asier Atutxa
, Jorge Sasiain
, Aleksander Pruski
, Elisa Rojas
, Marivi Higuero
, Eduardo Jacob
:
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware. 14-30 - Liquan Chen

, Yaqing Zhu, Suhui Liu, Hongtao Yu, Bing Zhang:
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication. 31-43 - Benjamín Arratia

, Erika Rosas
, Carlos T. Calafate
, Juan-Carlos Cano
, José M. Cecilia
, Pietro Manzoni
:
AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution. 44-58 - Jin Chen, Ziyang Guo, Liang Tan

:
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products. 59-71 - Hasan Kivrak

, Muhammed Z. Karakusak
, Simon Watson
, Barry Lennox
:
Cyber-physical system architecture of autonomous robot ecosystem for industrial asset monitoring. 72-84 - Kun Tang

, Guitao Xu, Pengwei Yan, Haoshen Zhu
, Wenjie Feng:
Coverage performance of cooperative NOMA MmWave networks with wireless power transfer. 85-96 - Khushnaseeb Roshan

, Aasim Zafar, Sheikh Burhan Ul Haque
:
Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system. 97-113 - Oscar Amador

, María Calderón
, Manuel Urueña, Ignacio Soto
:
Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC. 114-130 - Chenlu Gao

, Jing Yan, Xian Yang
, Xiaoyuan Luo, Xinping Guan:
An attack-resistant target localization in underwater based on consensus fusion. 131-147 - Xiaolin Wu, Demin Li

, Peng Wang
, Qinghua Tang
, Xuemin Chen
:
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs. 148-156 - Sebastian Boehm, Hartmut König:

Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study. 157-165 - Chih-Chung Lin

, Yuan-Cheng Lai
, Zelalem Legese Hailemariam
:
A distinguished-bit tracking knowledge-based query tree for RFID tag identification. 166-175 - Walid Abdallah:

A physical layer security scheme for 6G wireless networks using post-quantum cryptography. 176-187 - Shuanggen Liu

, Zhentao Liu, Jueqin Liang, Wanju Zhang, Zirong Heng:
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid. 188-197 - Fucai Zhou, Qiyu Wu

, Pengfei Wu, Jian Xu, Da Feng
:
Privacy-preserving and verifiable data aggregation for Internet of Vehicles. 198-208 - Iacovos Ioannou

, Prabagarane Nagaradjane, Pelin Angin
, Palaniappan Balasubramanian, Karthick Jeyagopal Kavitha, Palani Murugan, Vasos Vassiliou:
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening. 209-239 - Zhenshen Ou, Xiaofei Xing

, Siqi He, Guojun Wang:
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication. 240-252 - Yulin Qin

, Jie Zheng
, Hai Wang, Ling Gao, Yuhui Ma, Shuo Ji, Yi Liu, Jie Ren, Rui Cao, Yongxing Zheng:
Online Learning to parallel offloading in heterogeneous wireless networks. 253-262 - Fatma Foad Ashrif

, Elankovan A. Sundararajan
, Mohammad Kamrul Hasan, Rami Ahmad
, Aisha Hassan Abdalla Hashim, Azhar Abu Talib:
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0. 263-275 - Agung Mulyo Widodo, Hsing-Chung Chen

:
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency. 276-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














