


default search action
Computer Communications, Volume 166
Volume 166, January 2021
- Ayman Ibaida, Alsharif Abuadbba, Naveen K. Chilamkurti:
Privacy-preserving compression model for efficient IoMT ECG sharing. 1-8
- Leonardo Maccari
, Valeria Cagno
:
Do we need a contact tracing app? 9-18
- Prosanta Gope, Owen Millwood
, Neetesh Saxena:
A provably secure authentication scheme for RFID-enabled UAV applications. 19-25
- Yunpei Chen, Qi Zhu, Chunyan Feng, Xiaohui Li
:
Analysis of backlog and delay in downlink power-domain non-orthogonal multiple access wireless networks. 26-39 - Dariusz Marek
, Adam Domanski
, Joanna Domanska
, Tadeusz Czachórski
, Jerzy Klamka
, Jakub Szygula
:
Combined diffusion approximation-simulation model of AQM's transient behavior. 40-48
- Zheng Wang, Guangfu Li, Jia Ren:
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm. 49-56
- Zan Gao, Yuchan Yang, Mohammad Reza Khosravi, Shaohua Wan
:
Class consistent and joint group sparse representation model for image classification in Internet of Medical Things. 57-65
- Long Chen, Jigang Wu, Jun Zhang
:
Long-term optimization for MEC-enabled HetNets with device-edge-cloud collaboration. 66-80 - Zhixin Liu, Yongkang Wang, Yazhou Yuan, Kit Yan Chan:
Pricing-based interference management scheme in LTE-V2V communication with imperfect channel state information. 81-90
- Basudeb Bera
, Ashok Kumar Das
, Anil Kumar Sutrala
:
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment. 91-109
- Prabhat Kumar
, Govind P. Gupta
, Rakesh Tripathi:
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. 110-124
- Praveen Kumar Malik, Rohit Sharma
, Rajesh Singh
, Anita Gehlot
, Suresh Chandra Satapathy, Waleed S. Alnumay
, Danilo Pelusi, Uttam Ghosh
, Janmenjoy Nayak:
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art. 125-139
- K. Rajesh Rao
, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Role recommender-RBAC: Optimizing user-role assignments in RBAC. 140-153
- Pankaj Kumar, Lokesh Chouhan
:
A privacy and session key based authentication scheme for medical IoT networks. 154-164
- Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. 165-173
- Samuel Dayo Okegbile
, Bodhaswar T. Maharaj, Attahiru Sule Alfa:
Stochastic geometry approach towards interference management and control in cognitive radio network: A survey. 174-195 - Suat Mercan, Enes Erdin, Kemal Akkaya:
Improving transaction success rate in cryptocurrency payment channel networks. 196-207
- Gaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Wei (Lisa) Li:
Edge computing assisted privacy-preserving data computation for IoT devices. 208-215
- Lucas de Melo Guimarães, Jacir Luiz Bordim
:
A full-duplex MAC technique to improve spectrum-efficiency on 5G mobile wireless networks. 216-225
- Christian Grasso, Karthik Eswar K. N., Prabagarane Nagaradjane, Mridhula Ramesh
, Giovanni Schembra:
Designing the Tactile Support Engine to assist time-critical applications at the edge of a 5G network. 226-233
- Peng Feng
, Yuebin Bai, Yuhao Gu
, Jun Huang, Xiaolin Wang, Chang Liu:
A rapid coarse-grained blind wideband spectrum sensing method for cognitive radio networks. 234-243 - Xiaohui Gu
, Guoan Zhang:
Energy-efficient computation offloading for vehicular edge computing networks. 244-253
- Xiaoheng Deng, Yajun Liu, Congxu Zhu, Honggang Zhang:
Air-Ground Surveillance Sensor Network based on edge computing for target tracking. 254-261 - Zhiping Jin
, Zhibiao Liang, Yu Wang
, Weizhi Meng
:
Mobile network traffic pattern classification with incomplete a priori information. 262-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
