


default search action
Computer Communications, Volume 220
Volume 220, 2024
- Qingyi Zhu, Xuhang Luo, Yuhang Liu, Chenquan Gan

, Yu Wu
, Lu-Xing Yang
:
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model. 1-11 - Peiqiang Li, Guo-Jun Wang, Xiaofei Xing

, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
Detecting abnormal behaviors in smart contracts using opcode sequences. 12-22 - Xin Song, Runfeng Zhang

, Siyang Xu, Haiqi Hao, Jingyi Ma
:
Secrecy Enhancement of relay cooperative NOMA network based on user behavior. 23-34 - Zhong Wang, Funing Zhang, Anling Zhang, Jinyong Chang:

LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid. 35-42 - Gaetano Patti

, Luca Leonardi
, Giuseppe Testa
, Lucia Lo Bello
:
PrioMQTT: A prioritized version of the MQTT protocol. 43-51 - Lakshmikanta Sau

, Priyadarshi Mukherjee
, Sasthi C. Ghosh
:
DRAMS: Double-RIS assisted multihop routing scheme for device-to-device communication. 52-63 - Muhammad Aslam, Xianjun Jiao, Wei Liu, Michael T. Mehari, Thijs Havinga, Ingrid Moerman:

Corrigendum to 'A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver' [Comput. Commun. 219 (2024) 173-181]. 64 - Chen Wang

, Jian Xu, Haoran Li, Fucai Zhou, Qiang Wang:
Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems. 65-80 - Shihong Zou, Qiang Cao

, Ruichao Lu, Chenyu Wang, Guoai Xu, Huanhuan Ma, Yingyi Cheng, Jinwen Xi:
A robust and effective 3-factor authentication protocol for smart factory in IIoT. 81-93 - Perumalla Suman Prakash

, K. Seshadri Ramana, Renzon Daniel Cosmepecho, M. Janardhan, Meryelem Tania Churampi Arellano, J. Mahalakshmi, M. Bhavsingh, K. Samunnisa
:
Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture. 94-107 - Farzad Moradi, Vesal Hakami

, Seyed Vahid Azhari:
Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy. 108-127 - Xinxin Deng, Changgen Peng, Haoxuan Yang, Zongfeng Peng, Chongyi Zhong:

A dynamic data access control scheme for hierarchical structures in big data. 128-137 - Zhiwei Chang, Hanfeng Zhang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu:

Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals. 138-148 - Chunhua Jin

, Wenyu Qin, Zhiwei Chen, Kaijun Sun, Guanhua Chen, Jinsong Shan, Liqing Chen:
Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV. 149-159

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














